Network Security
Topic 3: User Authentication
Topic 3: User Authentication
1
5/25/2019
Network Security Topic 3: User Authentication Topic 3: User - - PowerPoint PPT Presentation
5/25/2019 Network Security Topic 3: User Authentication Topic 3: User Authentication 1 Reading for this Lecture 5/25/2019 Password Topic 3: User Authentication Password strength Salt_(cryptography) Password cracking
Topic 3: User Authentication
1
5/25/2019
Topic 3: User Authentication
2
5/25/2019
Topic 3: User Authentication
3
5/25/2019
Topic 3: User Authentication
4
5/25/2019
somebody is who he/she is claiming to be
action is allowed with respect to some well- defined rules or policies
after the fact
Topic 3: User Authentication
5
5/25/2019
something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, tracing the
packaging and labeling claims to be, or assuring that a computer program is a trusted one
to control access to areas and resources in a given physical facility or computer-based information system
Topic 3: User Authentication
6
5/25/2019
during decision making time to make a judgment whether an access request is valid
conditions of a valid access request
access request depends on contextual information
Topic 3: User Authentication
7
5/25/2019
Topic 3: User Authentication
8
5/25/2019
(A) I am John (B) Yeah, Right. (C) I am John, here is my token (D) OKAY
Topic 3: User Authentication
9
5/25/2019
possesses
Topic 3: User Authentication
10
5/25/2019
Topic 3: User Authentication
11
5/25/2019
eavesdrop and later impersonate
and a challenge
revealing it (Out of scope)
Topic 3: User Authentication
12
5/25/2019
passwords
current time
(Proposed by Lamport)
Topic 3: User Authentication
13
5/25/2019
The winner of the 2013 Turing Award
the document preparation system LaTeX
Turing Award for imposing clear, well- defined coherence on the seemingly chaotic behavior
distributed computing systems
Topic 3: User Authentication
14
5/25/2019
value t
Topic 3: User Authentication
15
5/25/2019
proving the knowledge of a secret, ‘challenge’
have learned?
prevent replay, interleaving attacks, provide uniqueness and timeliness
Topic 3: User Authentication
16
5/25/2019
Topic 3: User Authentication
17
5/25/2019
Topic 3: User Authentication
18
5/25/2019
authentication token due to its ease of deployment
was most likely the first deployment of passwords
computer systems like MULTICS and Unix in the 1970
Topic 3: User Authentication
19
5/25/2019
similar purpose as password
Identification Number (PIN)
Topic 3: User Authentication
20
5/25/2019
Topic 3: User Authentication
21
5/25/2019
passwords to be unpredictable
highly random things
the same password for all accounts
Topic 3: User Authentication
22
5/25/2019
Topic 3: User Authentication
23
5/25/2019
Topic 3: User Authentication
24
5/25/2019
Topic 3: User Authentication
25
5/25/2019
Topic 3: User Authentication
26
Source: The magical number seven, plus or minus two [Miller, 56] 5/25/2019
Topic 3: User Authentication
27
5/25/2019
Topic 3: User Authentication
28
this context…
5/25/2019
Topic 3: User Authentication
29
pamazon pgoogle ????
5/25/2019
inherently bad at remembering random information?
in human memory (USENIX-2014)
Topic 3: User Authentication
30
5/25/2019
56.4 bit secret learning after 36 logins
5/25/2019 Topic 3: User Authentication
31
Towards reliable storage of 56-bit secrets in human memory, Usenix Security 2014.
vendor and meant to be changed at installation time): password, default, admin, guest, etc.
bunnyhop!, IntenseCrabtree, etc.
deer2000, john1234, etc.,
l33th4x0r, g0ldf1sh, etc.
passpass, etc., can be easily tested automatically.
Topic 3: User Authentication
32
5/25/2019
qwerty, 12345, asdfgh, fred, etc.
numbers such as 911, 314159, or 27182, etc.,
telephone number, student ID, address, birthday, relative's or pet's names, etc.,
investigation of person's details.
Topic 3: User Authentication
33
5/25/2019
Topic 3: User Authentication
34
5/25/2019
deterring users from creating weak passwords is to notify them whenever they have created a weak password
sometimes good enough to make the user create a stronger password
Topic 3: User Authentication
35
5/25/2019
make to find the correct password
is, including how long the password is, what set of symbols it is drawn from, and how it is created.
validity of a guessed password
the checking is done, and any limitation on trying passwords
Topic 3: User Authentication
36
5/25/2019
as guess entropy), i.e., the information entropy of a password, measured in bits, is
needed to find the password with certainty
calculated in this way would be as strong as a string of 42 bits chosen randomly
the number of guesses required
Topic 3: User Authentication
37
5/25/2019
produce satisfactory passwords
entropy of human-generated passwords:
character;
per character;
character.
selected password has about 18 bits of entropy.
Topic 3: User Authentication
38
5/25/2019
category of characters: Lower-case letters, digits,
upper-case letters, special symbols
different entropy from “ao3swPd!2s1r”
probability of different strings as passwords: “A Study
IEEE S&P 2014.
strategies out there, which try passwords with different ordering
Topic 3: User Authentication
39
5/25/2019
passwords
12 noon and I am hungry” => “I’S12&IAH”
weaknesses
Topic 3: User Authentication
40
5/25/2019
password is bad
weakest link
abilities to test password guesses
lots of money
Topic 3: User Authentication
41
5/25/2019
protection mechanisms correctly. Also, to the extent that the user's mental image of his protection goals matches the mechanisms he must use, mistakes will be minimized. If he must translate his image of his protection needs into a radically different specification language, he will make errors.
Information in Computer Systems”, which identifies 8 security principles, including the “open design” principle
Topic 3: User Authentication
42
5/25/2019
client and server)
surfing, keyloggers
(the pretext) to persuade a target to release information or perform an action and is usually done
Topic 3: User Authentication
43
5/25/2019
dictionary attacks have become a real worry for system designers and security experts
Company Victims Adobe 2.9 million Evernote 50 million Twitter 250,000 Living Social 50 million
Topic 3: User Authentication
44
5/25/2019
together with each user’s login name, user id, home directory, login shell, etc.
proposed storing password hashes
many accounts?
Topic 3: User Authentication
45
5/25/2019
/etc/password into two files: /etc/password; and /etc/shadow (readable only by root)
H(password) in /etc/shadow
Topic 3: User Authentication
46
5/25/2019
and access control
that even if one layer fails, security is still not compromised
compromises
Topic 3: User Authentication
47
5/25/2019
Topic 3: User Authentication
48
5/25/2019
Specific Integrated Circuits) for password cracking
values, e.g., 355 million SHA2 hashes/s
(GPUs)
Topic 3: User Authentication
49
5/25/2019
e.g., bcrypt, scrypt
hash function designs (CASH)
attack
Topic 3: User Authentication
50
5/25/2019
AAAAAA password AAAAAB iloveyou AAAAAC monkey AAAAAD 12345678 AAAAAE password1 …… ……
Topic 3: User Authentication
51
5/25/2019
communicating with the real intended server
information is being communicated.
intercepted by the operating system, guaranteeing that the login window cannot be spoofed
Topic 3: User Authentication
52
5/25/2019
and passwords details by masquerading as a trustworthy entity in electronic communication.
users into visiting the sites and entering sensitive info
Topic 3: User Authentication
53
5/25/2019
typed on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
analyze HTTP packets
based
keyboard, automatic form filler, etc.
Topic 3: User Authentication
54
5/25/2019
Topic 3: User Authentication
55
5/25/2019
Topic 3: User Authentication
56
5/25/2019
Topic 3: User Authentication
57
P1 P2 … Pn-1 Pn
Real Password Honeywords
Password/ Honeyword Checker
5/25/2019
passwords for each website and stores them in a cryptographically secure manner.
Topic 3: User Authentication
58
5/25/2019
Topic 3: User Authentication
59
5/25/2019
Topic 3: User Authentication
60
Object: bike
5/25/2019
Topic 3: User Authentication
61
Person Alan Turing
Action Kissing Object Piranha
5/25/2019
Topic 3: User Authentication
62
Person Bill Gates
Action swallowing Object bike
5/25/2019
Topic 3: User Authentication
63
5/25/2019
Topic 3: User Authentication
64
+ = ? 5/25/2019
Initialization: User Memorizes Random Mapping Example: n=30 images
Topic 3: User Authentication
65
Image I
…
(I) 9 3 … 6
5/25/2019
Topic 3: User Authentication
66
= 4
5/25/2019
Topic 3: User Authentication
67
= 7
5/25/2019
Topic 3: User Authentication
68
1 2 3 4 5 6 7 8 9
Response: + mod 10 = 9+3 mod 10 = 2
5/25/2019
Topic 3: User Authentication
69
5/25/2019
used to be
Google and Microsoft use the same biometric, they can authenticate as you to each other
convenient to deploy. They generally require special hardware
Topic 3: User Authentication
70
5/25/2019
5/25/2019 Topic 3: User Authentication
71
https://www.youtube.com/watch?v=DJvgiMX1pv4
password, you can steal be safe
authentication all the time is not very usable
Topic 3: User Authentication
72
5/25/2019
http://www.ted.com/talks/bruce_schneier#t-625467
http://www.ted.com/talks/lorrie_faith_cranor_what_s_wrong_with_your _pa_w0rd#t-764198
http://arstechnica.com/security/2013/05/how-crackers-make-minced- meat-out-of-your-passwords/2/
Topic 3: User Authentication
73
5/25/2019
https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper- bonneau.pdf
fullversion.pdf
http://www.psych.utoronto.ca/users/peterson/psy430s2001/Miller%20GA%20Ma gical%20Seven%20Psych%20Review%201955.pdf
security.org/TC/SP2014/papers/AStudyofProbabilisticPasswordModels.pdf
Web Authentication Schemes: http://www.cl.cam.ac.uk/~fms27/papers/2012- BonneauHerOorSta-password--oakland.pdf
http://research.microsoft.com/pubs/250408/passwordsAndImperfectAuth.pdf
Topic 3: User Authentication
74
5/25/2019
Topic 3: User Authentication
75
5/25/2019