semi secure semi secure
play

Semi-Secure Semi-Secure where a hash is a secure one-way function. A - PDF document

One-Slide Summary Users often authenticate themselves by providing passwords. We store and compare hashes of passwords, Semi-Secure Semi-Secure where a hash is a secure one-way function. A cookie is a bit of state associated with a webpage


  1. One-Slide Summary • Users often authenticate themselves by providing passwords. We store and compare hashes of passwords, Semi-Secure Semi-Secure where a hash is a secure one-way function. A cookie is a bit of state associated with a webpage that is stored on Websites Websites the client. • The Turing machine is a fundamental model of & & computation. It models input, output, processing and memory. A Turing machine has a finite state machine controller as well as an infinite tape . At each step it Modeling Modeling reads the current tape symbol, writes a new tape symbol, moves the tape head left or right one square, Computation Computation and moves to a new state in the finite state machine controller. Turing machines are universal : they are just as powerful as Scheme, Python, C, or Java. #2 Authentication How do you authenticate? • Something you know – Password • Something you have How would I prove that I am a professor – Physical key (email account?, transparency?) and not a ninja? • Something you are – Biometrics (voiceprint, fingerprint, etc.) Serious authentication requires at least 2 kinds First Try: Encrypt Passwords Hashing 0 • Instead of storing password, store password 1 Many-to-one: maps a encrypted with secret K . 2 large number of values “neanderthal” “dog” 3 to a small number of • When user logs in, encrypt entered password and hash values 4 compare to stored encrypted password. 5 Even distribution: for 6 typical data sets, UserID Password “horse” 7 probability of ( H ( x ) = n ) alyssa encrypt K (“fido”) 8 = 1/ N where N is the 9 number of hash values ben encrypt K (“schemer”) and n = 0.. N – 1 . weimer encrypt K (“Lx.Ly.x”) Efficient: H ( x ) is easy to H (string s ) = ( s [0] – ‘a’) mod 10 compute. Problem if K isn’t so secret: decrypt K (encrypt K ( P )) = P

  2. Cryptographic Hash Functions Example One-Way Function Input: two 100 digit numbers, x and y One-way Given h , it is hard to find x Output: the middle 100 digits of x * y such that H ( x ) = h . Given x and y , it is easy to calculate f ( x , y ) = select middle 100 digits ( x * y ) Collision resistance Given x , it is hard to find y ≠ x Given f ( x , y ) hard to find x and y . such that H ( y ) = H ( x ) . A Better Hash Function? Actual Hashing Algorithms • Based on cipher block chaining • H ( x ) = encrypt x (0) – Start by encrypting 0 with the first block • Weak collision resistance? – Use the next block to encrypt the previous block – Given x , it should be hard to find y ≠ x such • SHA [NIST95] – 512 bit blocks, 160-bit hash that H ( y ) = H ( x ) . • MD5 [Rivest92] – 512 bit blocks, produces – Yes – encryption is one-to-one. (There is 128-bit hash no such y .) • A good hash function? – This is what we use in HoosHungry – No, its output is as big as the message! – It has been broken! Hashed Passwords Dictionary Attacks • Try a list of common passwords – All 1-4 letter words UserID Password – List of common (dog) names alyssa md5 (“fido”) – Words from dictionary ben md5 (“schemer”) – Phone numbers, license plates weimer md5 (“Lx.Ly.x”) – All of the above in reverse • Simple dictionary attacks retrieve most user-selected passwords • Precompute H( x ) for all dictionary entries

  3. (at least) 86% of users are Authenticating Users dumb and dumber Single ASCII character 0.5% • User proves they are a worthwhile person Two characters 2% by having a legitimate email address Three characters 14% – Not everyone who has an email address is Four alphabetic letters 14% worthwhile Five same-case letters 21% – Its not too hard to snoop (or intercept) someone’s email Six lowercase letters 18% • But, provides much better authenticating Words in dictionaries or names 15% than just the honor system Other (possibly good passwords) 14% (Morris/Thompson 79) Liberal Arts Trivia: Literature Liberal Arts Trivia: Music Theory • This term includes a variety of rhythms which are in • This slave and storyteller in Ancient some way unexpected: they deviate from the strict succession of regularly spaced strong and weak beats in Greece is credited with The Fox and the a meter. This can arise from a stress on a normally Grapes , The Tortoise and the Hare , and unstressed beat or a rest where one would normally be The Boy Who Cried Wolf . His work stressed. This technique is used in many musical styles, including funk, reggae, ragtime, jazz, classical music, inspired the French fabulist Jean de la and is a popular back beat for contemporary popular Fontaine, a widely-read 17 th century music. poet. Hungry vs. Cookies Using Cookies def checkCookie (): try: • A cookie is website state stored on the if 'HTTP_COOKIE' in os.environ: cookies = os.environ['HTTP_COOKIE'] client, not on a backend database. c = Cookie.SimpleCookie(cookies) user = c['user'].value • Cookie must be sent before any HTML is sent auth = c['authenticator'].value count = users.userTable.getCookieCount (user) (util.printHeader does this) ctest = md5crypt.encrypt (constants.ServerSecret + str(count) + user, \ str(count)) • Be careful how you use cookies – anyone can if True: ctest == auth: users.userTable.setCurrentUser (user) generate any data they want in a cookie return True else: – Make sure they can’t be tampered with: use users.userTable.setCurrentUser (False) return False md5 hash with secret to authenticate Paging else: UVA return False – Don’t reuse cookies - easy to intercept them (or NetBadge! except: return False steal them from disks): use a counter than changes every time a cookie is used

  4. How convincing was our Problems Left Halting Problem proof? • The database password is visible in plaintext in the Python code (define ( contradict-halts x) (if (halts? contradict-halts) – No way around this (with UVa mysql server) (loop-forever) – Anyone who can read UVa filesystem can access #t)) your database contradicts-halts cannot exist. Everything we • The password is transmitted unencrypted used to make it except halts? does exist, over the Internet (later) therefore halts? cannot exist. • Proving you can read an email account is not good enough to authenticate for important This “proof” assumes Scheme exists and is consistent! applications DrScheme DrScheme Is DrScheme a proof that Scheme exists? Is DrScheme a proof that Scheme exists? (define (make-huge n) (if (= n 0) null (cons (make-huge (- n 1)) (make-huge (- n 1))))) (make-huge 10000) No! Scheme/Charme/Python/etc. all fail to evaluate some program! Solutions Modeling Computation • Option 1: Prove “Scheme” does exist • For a more convincing proof, we need a – Show that we could implement all the more precise (but simple) model of what a evaluation rules (if we had “Python”, our computer can do Charme interpreter would be a good start, but • Another reason we need a model: we don’t have “Python”) • Option 2: Find a simpler computing model Does complexity really make sense without this? (how do we know what a – Define it precisely “step” is? are they the same for all – Show that “contradict-halts” can be defined in computers?) this model

  5. How should we model a Computer? What is a model? Colossus (1944) Cray-1 (1976) Apollo Guidance Computer (1969) Turing invented the model we’ll use today in 1936. What “computer” was he modeling? IBM 5100 (1975) “Computers” before WWII Modeling Computers • Input – Without it, we can’t describe a problem • Output – Without it, we can’t get an answer • Processing – Need some way of getting from the input to the output • Memory – Need to keep track of what we are doing Modeling Input Turing’s “Computer” “Computing is normally done by writing certain symbols on paper. We may suppose this paper is divided into squares Punch Cards like a child’s arithmetic book.” Alan Turing, Altair BASIC Paper Tape, 1976 On computable numbers, with an application to the Entscheidungsproblem , 1936 Engelbart’s mouse and keypad

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend