Академический Документы
Профессиональный Документы
Культура Документы
User Authentication
RFC 4949
RFC 4949 defines user authentication as:
The process of verifying an identity claimed
by or for a system entity.
Authentication Process
Fundamental Identification step
building block Presenting an
identifier to the
and primary security system
line of
defense
Verification step
Presenting or
generating
authentication
Basis for information that
access control corroborates the
binding between
and user the entity and
accountability the identifier
Registration, Credential Issuance,
and Maintenance
Registration Identity Proofing Subscriber/ Authenticated Session Relying
Authority (RA) User Registration Claimant Party (RP)
Registration Authenticated
Confirmation Assertion
Credential
Token/Credential
Service Verifier
Provider (RA) Validation
E-Authentication using
Token and Credential
Areas of
risk
Assurance Level
More
specifically is
Four levels of
defined as: assurance
Describes an
organizations
degree of The degree of
confidence in the
Level 1
Little or no confidence in the
certainty that a vetting process used to asserted identity's validity
establish the identity of
user has the individual to whom Level 2
presented a the credential was
issued
Some confidence in the
asserted identitys validity
credential that
refers to his or Level 3
her identity The degree of
confidence that the
High confidence in the
asserted identity's validity
individual who uses the
credential is the
individual to whom the Level 4
credential was issued Very high confidence in the
asserted identitys validity
Potential Impact
FIPS 199 defines three levels of potential
impact on organizations or individuals
should there be a breach of security:
o Low
An authentication error could be expected to have a
limited adverse effect on organizational operations,
organizational assets, or individuals
o Moderate
An authentication error could be expected to have a
serious adverse effect
o High
An authentication error could be expected to have a
severe or catastrophic adverse effect
Table 3.1
AssuranceLevel Impact Profiles
Potential Impact Categories for Authentication Errors 1 2 3 4
Inconvenience, distress, or damage to standing or Low Mod Mod High
reputation Low Mod Mod High
Financial loss or organization liability None Low Mod High
Harm to organization programs or interests None Low Mod High
Unauthorized release of sensitive information Mod/
Personal safety None None Low
High
Civil or criminal violations None Low Mod High
Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
Password
Password File
User ID Salt Hash code
Salt
slow hash Load
function
Password File
User id
User ID Salt Hash code
Salt
Select Password
slow hash
function
Hashed password
Compare
(b) Verifyinga password
Now regarded as
inadequate
Still often required for compatibility with
existing account management software
or multivendor environments
Improved
Implementations
OpenBSD uses Blowfish
block cipher based hash
algorithm called Bcrypt
Most secure version of Unix
Much stronger hash/salt hash/salt scheme
schemes available for Uses 128-bit salt to create
Unix 192-bit hash value
Recommended hash
function is based on
MD5
Salt of up to 48-bits
Password length is unlimited
Produces 128-bit hash
Uses an inner loop with 1000
iterations to achieve
slowdown
Password Cracking
Dictionary attacks Rainbow table
Develop a large dictionary attacks
of possible passwords and Pre-compute tables of
try each against the hash values for all salts
password file A mammoth table of hash
Each password must be values
hashed using each salt Can be countered by using
value and then compared
a sufficiently large salt
to stored hash values
value and a sufficiently
large hash length
40%
Percent guessed
30%
20%
10%
0%
104 107 1010 1013
Number of guesses
Make
available
only to
privileged
Vulnerabilities
users
Bloom filter
Used
Used to
to build
build a
a
table
table based
based on
on
dictionary
dictionary using
using
hashes
hashes
Check
Check desired
desired
password
password against
against
this
this table
table
1
0 .1
2 h a s h fu n c tio n s
Pr[false positive]
0 .0 1
4 h a s h fu n c tio n s
6 h a s h fu n c tio n s
0 .0 0 1
0 5 10 15 20
F i g u r e 3 .4 P e r f o r m a n c e o f B l o o m F i l t e r
Table 3.2
Card Type DefiningFeature Example
Embossed Raised characters only, on Old credit card
front
Magnetic stripe Magnetic bar on back, characters on front Bank card
Memory Electronic memory inside Prepaid phone card
Smart Electronic memory and processor inside Biometric ID card
Contact Electrical contacts exposed on surface
Contactless Radio antenna embedded inside
Authentication protocol:
o Classified into three categories:
Static
Dynamic password generator
Challenge-response
Smart Cards
Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
Contain:
o An entire microprocessor
Processor
Memory
I/O ports
Typically include three types of memory:
o Read-only memory (ROM)
Stores data that does not change during the cards life
o Electrically erasable programmable ROM (EEPROM)
Holds application data and programs
o Random access memory (RAM)
Holds temporary data generated when applications are executed
Electronic Identity Cards
(eID)
Most advanced deployment is
Use of a smart card as a national
the German card neuer
identity card for citizens
Personalausweis
Can serve the same purposes as other Has human-readable data printed on its
national ID cards, and similar cards such as surface
a drivers license, for access to government Personal data
and commercial services Document number
Card access number (CAN)
Machine readable zone (MRZ)
Electronic
Functions
and Data
for
eID Cards
Host/application
server
For offline
applications, either
the MRZ printed on
For online the back of the card or
applications, access is the six-digit card
established by the user access number (CAN)
Ensures that the entering the 6-digit printed on the front is
contactless RF chip in PIN (which should used
the eID card cannot be only be known to the
read without explicit holder of the card)
access control
Biometric Authentication
Attempts to authenticate an individual based on
unique physical characteristics
Based on pattern recognition
Is technically complex and expensive when
compared to passwords and tokens
Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Name(PIN)
Biometric Feature
sensor extractor Biometric
database
User interface
(a) Enrollment
Name(PIN)
Biometric Feature
sensor extractor Biometric
database
Biometric Feature
sensor extractor Biometric
database
decision
threshold (t)
imposter profileof
profile genuineuser
false
nonmatch false
possible match
possible
Matching score(s)
averagematching averagematching
valueof imposter valueof genuineuser
10%
falsenonmatch rate
1%
0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
falsematch rate 100%
10%
1%
0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
falsematch rate
LAN switch
Iris Merge
Remote
Iris
database
Network
switch
ATM
Security
Problems
Summary
Electronic user Biometric
authentication principles authentication
o A model for electronic user
o Physical characteristics
authentication
used in biometric
o Means of authentication
applications
o Risk assessment for user
o Operation of a biometric
authentication
authentication system
Password-based o Biometric accuracy
authentication Remote user
o The vulnerability of passwords
o The use of hashed passwords authentication
o Password cracking of user-chosen o Password protocol
passwords o Token protocol
o Password file access control o Static biometric protocol
o Password selection strategies
o Dynamic biometric
Token-based protocol
authentication Security issues for
o Memory cards
o Smart cards
user
o Electronic identity cards authentication