ch03 Auth
ch03 Auth
ch03 Auth
Authentication
&
Access Control
Information Security
Nguyễn Đăng Quang
Understand
Understand the importance of
authentication,
Learn
Learn how authentication can be
Goals implemented,
Understand
Understand threats to the
authentication.
What is Authentication?
Authentication Authorization
Computer
Who are you? Does this person Resources
Prove it have permission
You are
to access the
who you
requested You have
say you
resource? permission
are
to access
these
resources
What is Authentication?
• Knowledge-based:
Something a user knows
• Possession-based:
Something a user has
• Inheritance-based:
Something a user is
Authentication factors
• Single-factor authentication
• Two-factor authentication
• Two-factor authentication
The Importance of a Trusted Path
• The path connecting you and the TCB
• Trusted path is provided by
The OS
Or
The combination of hardware and OS
Example:
Ctrl – Alt –Del
Keyboard + Display + OS ➔ Trusted path
Password
authentication
Something you know
What is password authentication?
• Password authentication is a process that involves a
user inputting a unique ID and key that are then
checked against stored credentials.
“PASSWORDS ARE ONE OF THE BIGGEST PRACTICAL “HUMANS ARE INCAPABLE OF SECURELY STORING HIGH-
PROBLEMS FACING SECURITY ENGINEERS TODAY.” QUALITY CRYPTOGRAPHIC KEYS, AND THEY HAVE
UNACCEPTABLE SPEED AND ACCURACY WHEN
PERFORMING CRYPTOGRAPHIC OPERATIONS”
Keys vs Passwords
Crypto keys Passwords
• Passwords are 8
• Key is 64 bits
characters, and 256
• Then 264 keys different characters
• Then 2568 = 264 pwds
• Choose key at
• Users do not select
random…
passwords at random
• …then attacker must • Attacker has far less
try about 263 keys than 263 pwds to try
(dictionary attack)
Three groups of users ⎯ each group advised to
select passwords as follows
Results
Authentication them.
Implementation
A string of
Password H(password)
fixed length
• Pre-Image resistance:
Its inverse should be very hard to
compute.
Features of
• Collision Resistance (Collision Free):
hash function It should be hard to find two
different inputs of any length that
result in the same hash.
How hashes are cracked
Dictionary & Brute Force
How hashes are cracked
Lookup An extremely effective method for cracking many hashes
Examples
o Fingerprint Are
o Facial recognition
o Speech recognition
o ...
Enrollment vs Recognition
Biometric passports,
Private, but not secret fingerprints and DNA
on objects…
Even random-looking
biometrics may not be
Birthday paradox!
sufficiently unique for
authentication
Potentially forgeable
slide 35
Forging Handwriting
[Ballard, Monrose, Lopresti]
Biometrics
Biometrics
[Advanced Institute of
“All you need Industrial Technology,
Japan]
to do is sit”
“Forget Fingerprints:
Car Seat IDs Driver’s
Rear End”
Risks of
Biometrics
slide 42
Surgical Change
slide 43
Stealing Biometrics
slide 44
Involuntary Cloning
“my voice is my
cloned retina Fingerprints from
password”
beer bottles
Bad news: it works! Eye laser scan
slide 45
Molding (Involuntary)
Making a Mold (Voluntary)
Making a Finger (Voluntary)
Iris Patterns
0.29 1 in 1.31010
0.30 1 in 1.5109
0.31 1 in 1.8108
0.32 1 in 2.6107
0.33 1 in 4.0106
0.34 1 in 6.9105
0.35 1 in 1.3105
== equal error rate
distance
Attack on Iris Scan