Chapter 07
Chapter 07
Chapter 07
• Who is who?
• Authentication Tokens
• Certificate-based Authentication
• Biometrics
Password Authentication - 1
Login Screen
User id : _________
Password : _________
Ok Cancel
Password Authentication - 2
Server
Login request
Id = atul
Password = april
Password Authentication - 3
Id Password
Server Jyoti tiger
User authenticator program Amar newroad
Atul april
……
Id = atul
Password = april
Password Authentication - 4
Id Password
Server Jyoti tiger
Amar newroad
User authenticator program
Atul april
……
Success
Password Authentication - 5
Server
Login successful
Application Menu
1. View Balance
2. Transfer money
….
Message Digests of Passwords
• Original clear text password is never
stored/transmitted
tiger G%6$1
newroad Vt^80+1
april +{:>9mn
…
Step 2: Store the user ids and message digests of the passwords in the user database.
Server
Id Password
User creation program
Jyoti G%6$1
Amar Vt^80+1
Atul +{:>9mn
User database
Authentication Tokens
• Token and server are synchronized initially
Id = atul
Seed = 615019191
Server
Id Seed
Jyoti 159010191
User record creation Amar 415901617
Atul 615019191
Seed = 615019191
User database
Seed
Authentication token
Authentication Token Types
Authentication Tokens
User Id Atul
Your response
Certificate-based Authentication
• User’s certificate details need to be stored
on the server-side
Certificate Server
Certification
Authority (CA) User database
To respective users
Certificate-based Authentication
Step 1: User’s computer encrypts the random challenge with the user’s private
key to produce the digital signature.
Server
Id = atul
Sign = 90184112124832
Smart Card Issues and Solutions
Problem/Issue Emerging solution
Smart card readers are not yet a part of a The new versions of computers and mobile
desktop computer, unlike a hard disk devices are expected to come with smart card
drive or a floppy disk drive readers out of the box.
Non-availability of smart card reader Microsoft has made the PC/SC smart card framework
driver software an integral part of the Windows 2000 operating
system. Most smart card reader manufacturers ship
the PC/SC compliant reader drivers, making the
process of adding a reader hardware to the computer
a plug-and-play operation.
Non availability of smart card aware Smart-card aware software such as Microsoft
cryptographic services software Crypto API (MS-CAPI) comes free with Internet
Explorer.
Cost of smart cards and card readers is This is reducing now. Smart cards are available for
high about $5, and the card readers for about $20.
Biometric Authentication
• Fingerprint
• Voice
• Pattern of lines in the iris
KERBEROS
Alice AS
Login
Id = Alice
AS sends back encrypted session key
and TGT to Alice
Alice Output*
AS
Session key
Alice (KS)
Output*
Alice sends a request for a SGT
to the TGs
Alice
Request for a SGT TGS
Output*
Timestamp
Output*
TGS sends response back to
Alice
Alice Output*
TGS
Alice KAB
Bob KAB
Output*
Alice sends KAB securely to Bob
Alice
Sending KAB Bob
Output*
Timestamp
Encrypted
Timestamp (Alice + KAB) encrypted with Bob’s
(ET) secret key
Output*
Bob acknowledges the receipt of
KAB
Alice
Bob
Encrypted
Timestamp
(ET)*
Single Sign On (SSO)
Approaches
Single Sign On (SSO)
Approaches
A Sender: A
KA A
Receiver: B
KDC Random number (R)
1
B KB
KDC
2
Encrypted with KS Encrypted with KA
A Actual data that A
wants to send to B. KS
B will respond A’s request
KS encrypted with KB
similarly.
A encrypted with KB
3
B
Security Handshake Pitfalls
One-way authentication
A B
Ok!
Verified successfully.
2
Shared Secret
1
User name: A
3
Shared Secret – Modified Approach
User name: A
A Random challenge B
Random challenge
(R)
3
One Way Public Key – Approach 1
User name: A
Random challenge
(R) encrypted with
A’s private key
3
One Way Public Key – Approach 2
User name: A
Random challenge
B
A
(R) encrypted with
A’s private key 2
Random challenge
(R)
3
Mutual Authentication Approaches
Mutual authentication
1
User name: A, R2
2
R1 encrypted with
KAB
3
Reflection Attack – 1
1
User name: A
Random challenge: R2
C B
R1 encrypted B
C
with KAB
Mutual Authentication Using Public
Keys
1
User name: A, (R2
encrypted with B’s
public key)
A B
R2, (R1 encrypted
with A’s public key)
2
R1
3
Mutual Authentication Using
Timestamps
1
User name: A,
(Current timestamp
encrypted with KAB)
A B