+ All Categories
Home > Documents > Lect5 authentication 5_dec_2012-1

Lect5 authentication 5_dec_2012-1

Date post: 20-May-2015
Category:
Upload: khawar-nehal-khawarnehalatrcnetpk
View: 322 times
Download: 1 times
Share this document with a friend
Popular Tags:
13
Lecture 5 User Authentication
Transcript
Page 1: Lect5 authentication 5_dec_2012-1

Lecture 5User Authentication

Page 2: Lect5 authentication 5_dec_2012-1

RFC 2828: user authentication

“The process of verifying an identity claimed by or for a system entity.”

Page 3: Lect5 authentication 5_dec_2012-1

Authentication Process

• fundamental building block and primary line of defense

• basis for access control and user accountability• identification step

– presenting an identifier to the security system• verification step

– presenting or generating authentication information that corroborates the binding between the entity and the identifier

Page 4: Lect5 authentication 5_dec_2012-1

User Authentication

the four means of authenticating user identity are based on:

something the individual knows password, PIN,

answers to prearranged questions

something the individual possesses (token) smartcard,

electronic keycard, physical key

something the individual is (static biometrics) fingerprint,

retina, face

something the individual does (dynamic biometrics) voice pattern,

handwriting, typing rhythm

Page 5: Lect5 authentication 5_dec_2012-1

Password Authentication

• widely used line of defense against intruders– user provides name/login and password– system compares password with the one stored

for that specified login• the user ID:

– determines that the user is authorized to access the system

– determines the user’s privileges– is used in discretionary access control

Page 6: Lect5 authentication 5_dec_2012-1

electronic monitoring

password guessing against

single user

Password Vulnerabilities

offline dictionary

attack

specific account attack

popular password attack

workstation hijacking

exploiting user mistakes

exploiting multiple

password use

Page 7: Lect5 authentication 5_dec_2012-1

Countermeasures• controls to prevent unauthorized access to password

file• intrusion detection measures• rapid reissuance of compromised passwords• account lockout mechanisms• policies to inhibit users from selecting common

passwords • training in and enforcement of password policies• automatic workstation logout• policies against similar passwords on network devices

Page 8: Lect5 authentication 5_dec_2012-1

Use of Hashed Passwords

• prevents duplicate passwords from being visible in the password file.

• greatly increases the difficulty of offline dictionary attacks. For a salt of length b bits, the number of possible passwords is increased by a factor of 2b.

• becomes nearly impossible to find out whether a person with passwords on two or more systems has used the same password on all of them.

Page 9: Lect5 authentication 5_dec_2012-1

UNIX Implementation

• original scheme– up to eight printable characters in length– 12-bit salt used to modify DES encryption into a

one-way hash function– zero value repeatedly encrypted 25 times– output translated to 11 character sequence

• now regarded as inadequate– still often required for compatibility with existing

account management software or multivendor environments

Page 10: Lect5 authentication 5_dec_2012-1

Improved Implementations• much stronger hash/salt schemes available for Unix• recommended hash function is based on MD5

– salt of up to 48-bits– password length is unlimited– produces 128-bit hash– uses an inner loop with 1000 iterations to achieve

slowdown

• OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt– most secure version of Unix hash/salt scheme– uses 128-bit salt to create 192-bit hash value

Page 11: Lect5 authentication 5_dec_2012-1

Password Cracking

• dictionary attacks– develop a large dictionary of possible passwords

and try each against the password file– each password must be hashed using each salt

value and then compared to stored hash values• rainbow table attacks

– pre-compute tables of hash values for all salts– a mammoth table of hash values – can be countered by using a sufficiently large salt

value and a sufficiently large hash length

Page 12: Lect5 authentication 5_dec_2012-1

Observed Password Lengths

Purdue University study on 54 systems and 7000 users

Page 13: Lect5 authentication 5_dec_2012-1

Passwords Cracked from a Sample Set of 13,797 Accounts

Compiled 3M dictionary words and their variations.

The more words that need to be tested for a match, the lower the cost/benefit ratio.


Recommended