Вы находитесь на странице: 1из 44

Chapter 3

User Authentication
RFC 4949
RFC 4949 defines user authentication as:
The process of verifying an identity claimed
by or for a system entity.
Authentication Process
Fundamental Identification step
building block Presenting an
identifier to the
and primary security system
line of
defense
Verification step
Presenting or
generating
authentication
Basis for information that
access control corroborates the
binding between
and user the entity and
accountability the identifier
Registration, Credential Issuance,
and Maintenance
Registration Identity Proofing Subscriber/ Authenticated Session Relying
Authority (RA) User Registration Claimant Party (RP)

Registration Authenticated
Confirmation Assertion

Credential
Token/Credential
Service Verifier
Provider (RA) Validation

E-Authentication using
Token and Credential

Figure3.1 TheNIST SP 800-63-2 E-Authentication Architectural Model


The four means of authenticating
user identity are based on:
Something Something Something Something
the the the the
individual individual individual is individual
knows possesses (static does
Password, PIN, (token) biometrics) (dynamic
answers to Smartcard, Fingerprint, biometrics)
prearranged electronic retina, face Voice pattern,
questions keycard, handwriting,
physical key typing rhythm
Risk Assessment for
User Authentication

There are Assurance


three Level
separate
concepts:
Potential
impact

Areas of
risk
Assurance Level
More
specifically is
Four levels of
defined as: assurance
Describes an
organizations
degree of The degree of
confidence in the
Level 1
Little or no confidence in the
certainty that a vetting process used to asserted identity's validity
establish the identity of
user has the individual to whom Level 2
presented a the credential was
issued
Some confidence in the
asserted identitys validity
credential that
refers to his or Level 3
her identity The degree of
confidence that the
High confidence in the
asserted identity's validity
individual who uses the
credential is the
individual to whom the Level 4
credential was issued Very high confidence in the
asserted identitys validity
Potential Impact
FIPS 199 defines three levels of potential
impact on organizations or individuals
should there be a breach of security:
o Low
An authentication error could be expected to have a
limited adverse effect on organizational operations,
organizational assets, or individuals
o Moderate
An authentication error could be expected to have a
serious adverse effect
o High
An authentication error could be expected to have a
severe or catastrophic adverse effect
Table 3.1
AssuranceLevel Impact Profiles
Potential Impact Categories for Authentication Errors 1 2 3 4
Inconvenience, distress, or damage to standing or Low Mod Mod High
reputation Low Mod Mod High
Financial loss or organization liability None Low Mod High
Harm to organization programs or interests None Low Mod High
Unauthorized release of sensitive information Mod/
Personal safety None None Low
High
Civil or criminal violations None Low Mod High

Maximum Potential Impacts for Each


Assurance Level
Password Authentication
Widely used line of defense against
intruders
o User provides name/login and password
o System compares password with the one stored for that
specified login
The user ID:
o Determines that the user is authorized to access the
system
o Determines the users privileges
o Is used in discretionary access control
Password Vulnerabilities
Offline Password
guessing Workstation Electronic
dictionary against hijacking monitoring
attack single user

Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
Password
Password File
User ID Salt Hash code
Salt


slow hash Load
function

(a) Loadinga new password

Password File
User id
User ID Salt Hash code

Salt

Select Password

slow hash
function

Hashed password
Compare
(b) Verifyinga password

Figure3.2 UNIX Password Scheme


UNIX Implementation
Original scheme
Up to eight printable characters in
length
12-bit salt used to modify DES
encryption into a one-way hash function
Zero value repeatedly encrypted 25
times
Output translated to 11 character
sequence

Now regarded as
inadequate
Still often required for compatibility with
existing account management software
or multivendor environments
Improved
Implementations
OpenBSD uses Blowfish
block cipher based hash
algorithm called Bcrypt
Most secure version of Unix
Much stronger hash/salt hash/salt scheme
schemes available for Uses 128-bit salt to create
Unix 192-bit hash value

Recommended hash
function is based on
MD5
Salt of up to 48-bits
Password length is unlimited
Produces 128-bit hash
Uses an inner loop with 1000
iterations to achieve
slowdown
Password Cracking
Dictionary attacks Rainbow table
Develop a large dictionary attacks
of possible passwords and Pre-compute tables of
try each against the hash values for all salts
password file A mammoth table of hash
Each password must be values
hashed using each salt Can be countered by using
value and then compared
a sufficiently large salt
to stored hash values
value and a sufficiently
large hash length

Password crackers John the Ripper


exploit the fact that Open-source password
people choose easily cracker first developed in
in 1996
guessable passwords Uses a combination of
Shorter password lengths brute-force and dictionary
are also easier to crack techniques
Modern Approaches
Complex password policy
o Forcing users to pick stronger passwords

However password-cracking techniques


have also improved
o The processing capacity available for password cracking has
increased dramatically
o The use of sophisticated algorithms to generate potential
passwords
o Studying examples and structures of actual passwords in use
50%

40%
Percent guessed

30%

20%

10%

0%
104 107 1010 1013
Number of guesses

Figure3.3 ThePercentageof Passwords Guessed After


a Given Number of Guesses
Password File Access Control

Can block offline guessing attacks by denying


access to encrypted passwords

Make
available
only to
privileged
Vulnerabilities
users

Weakness Accident Users with


Sniff
in the OS with same Access from
passwords
Shadow that allows permissions password backup
in network
password access to the making it on other media
traffic
file file readable systems
Password Selection Strategies
User education
Users can be told the importance of using hard to guess passwords and can be provided with guidelines for selecting strong passwords

Computer generated passwords


Users have trouble remembering them

Reactive password checking


System periodically runs its own password cracker to find guessable passwords

Complex password policy


User is allowed to select their own password, however the system Goal is to eliminate guessable passwords while allowing the user to
checks to see if the password is allowable, and if not, rejects it select a password that is memorable
Proactive Password
Checking
Rule
Password enforcement
cracker Specific
Specific rules
rules that
that
Compile
Compile aa large
large passwords
passwords must
must
dictionary
dictionary of
of adhere
adhere to
to
passwords
passwords not
not to
to
use
use

Bloom filter
Used
Used to
to build
build a
a
table
table based
based on
on
dictionary
dictionary using
using
hashes
hashes
Check
Check desired
desired
password
password against
against
this
this table
table
1

0 .1
2 h a s h fu n c tio n s
Pr[false positive]

0 .0 1
4 h a s h fu n c tio n s

6 h a s h fu n c tio n s

0 .0 0 1

0 5 10 15 20

R a tio o f h a s h ta b le s iz e (b its ) to d ic tio n a ry s iz e (w o rd s )

F i g u r e 3 .4 P e r f o r m a n c e o f B l o o m F i l t e r
Table 3.2
Card Type DefiningFeature Example
Embossed Raised characters only, on Old credit card
front
Magnetic stripe Magnetic bar on back, characters on front Bank card
Memory Electronic memory inside Prepaid phone card
Smart Electronic memory and processor inside Biometric ID card
Contact Electrical contacts exposed on surface
Contactless Radio antenna embedded inside

Types of Cards Used as Tokens


Memory Cards
Can store but do not process data
The most common is the magnetic stripe card
Can include an internal electronic memory
Can be used alone for physical access
o Hotel room
o ATM
Provides significantly greater security when combined
with a password or PIN
Drawbacks of memory cards include:
o Requires a special reader
o Loss of token
o User dissatisfaction
Smart Tokens
Physical characteristics:
o Include an embedded microprocessor
o A smart token that looks like a bank card
o Can look like calculators, keys, small portable objects
Interface:
o Manual interfaces include a keypad and display for interaction
o Electronic interfaces communicate with a compatible
reader/writer

Authentication protocol:
o Classified into three categories:
Static
Dynamic password generator
Challenge-response
Smart Cards
Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols

Contain:
o An entire microprocessor
Processor
Memory
I/O ports
Typically include three types of memory:
o Read-only memory (ROM)
Stores data that does not change during the cards life
o Electrically erasable programmable ROM (EEPROM)
Holds application data and programs
o Random access memory (RAM)
Holds temporary data generated when applications are executed
Electronic Identity Cards
(eID)
Most advanced deployment is
Use of a smart card as a national
the German card neuer
identity card for citizens
Personalausweis

Can serve the same purposes as other Has human-readable data printed on its
national ID cards, and similar cards such as surface
a drivers license, for access to government Personal data
and commercial services Document number
Card access number (CAN)
Machine readable zone (MRZ)

Can provide stronger proof of identity and


can be used in a wider variety of
applications

In effect, is a smart card that has been


verified by the national government as valid
and authentic
Table 3.3

Electronic
Functions
and Data
for
eID Cards

CAN = card access number


MRZ = machine readable zone
PACE = password authenticated connection establishment
PIN = personal identification number
eID
server

6. User enters PIN

1. User requests service


(e.g., via Web browser)

Host/application
server

Figure3.6 User Authentication with eID


Password Authenticated
Connection Establishment (PACE)

For offline
applications, either
the MRZ printed on
For online the back of the card or
applications, access is the six-digit card
established by the user access number (CAN)
Ensures that the entering the 6-digit printed on the front is
contactless RF chip in PIN (which should used
the eID card cannot be only be known to the
read without explicit holder of the card)
access control
Biometric Authentication
Attempts to authenticate an individual based on
unique physical characteristics
Based on pattern recognition
Is technically complex and expensive when
compared to passwords and tokens
Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Name(PIN)

Biometric Feature
sensor extractor Biometric
database

User interface
(a) Enrollment

Name(PIN)

Biometric Feature
sensor extractor Biometric
database

User interface Feature


true/false
matcher Onetemplate
(b) Verification

Biometric Feature
sensor extractor Biometric
database

User interface user's identity or Feature


"user unidentified" matcher N templates
(c) Identification

Figure 3.8 A Generic Biometric System. Enrollment creates


an association between a user and the user's biometric
characteristics. Depending on the application, user
authentication either involves verifying that a claimed user is
the actual user or identifying an unknown user .
Probability
density function

decision
threshold (t)
imposter profileof
profile genuineuser

false
nonmatch false
possible match
possible

Matching score(s)
averagematching averagematching
valueof imposter valueof genuineuser

Figure 3.9 Profiles of a Biometric Characteristic of an Imposter and an Authorized


Users In this depiction, the comparison between presented feature and a reference
feature is reduced to a single numeric value. If the input value ( s) is greater than a
preassigned threshold (t), a match is declared.
100%

10%
falsenonmatch rate

1%

0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
falsematch rate 100%

Figure3.10 Idealized Biometric Measurement


Operating Characteristic Curves (log-log scale)
Face Fingerprint Voice Hand Iris
100%
falsenonmatch rate

10%

1%

0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
falsematch rate

Figure 3.11 Actual Biometric Measurement Operating Characteristic Curves,


reported in [MANS01]. To clarify differences among systems, a log-log scale is used.
Remote User Authentication
Authentication over a network, the Internet, or a
communications link is more complex
Additional security threats such as:
o Eavesdropping, capturing a password, replaying an
authentication sequence that has been observed

Generally rely on some form of a challenge-


response protocol to counter threats
Table 3.4
Some Potential
Attacks,
Susceptible
Authenticators,
and
Typical
Defenses
Eavesdropping
Adversary attempts to
learn the password by
some sort of attack that
Denial-of-Service involves the physical Host Attacks
proximity of user and
Directed at the user
adversary
file at the host where
Attempts to disable a passwords, token
user authentication passcodes, or
service by flooding the biometric templates
service with numerous are stored
authentication
attempts
AUTHENTICATI
ON
SECURITY
Trojan Horse ISSUES
An Replay
application or physical Adversary repeats a
device masquerades as Client Attacks previously captured
an authentic user response
application or device Adversary attempts to
for the purpose of achieve user
capturing a user authentication
password, passcode, or without access to the
biometric remote host or the
intervening
communications path
Iris Iris Iris
scanner scanner scanner

Iris workstation Iris workstation Iris workstation

LAN switch

Iris Merge
Remote

Iris
database

Iris Engine1 Iris Engine2

Network
switch

Figure3.13 General Iris Scan Site Architecturefor UAE System


Case Study:

ATM
Security
Problems
Summary
Electronic user Biometric
authentication principles authentication
o A model for electronic user
o Physical characteristics
authentication
used in biometric
o Means of authentication
applications
o Risk assessment for user
o Operation of a biometric
authentication
authentication system
Password-based o Biometric accuracy
authentication Remote user
o The vulnerability of passwords
o The use of hashed passwords authentication
o Password cracking of user-chosen o Password protocol
passwords o Token protocol
o Password file access control o Static biometric protocol
o Password selection strategies
o Dynamic biometric
Token-based protocol
authentication Security issues for
o Memory cards
o Smart cards
user
o Electronic identity cards authentication

Вам также может понравиться