4 User Authentication
4 User Authentication
Network Security
Seventh Edition, Global Edition
by William Stallings
Verification
• Presenting an step
identifier to the •Presenting or generating
security system authentication information
that corroborates the binding
between the entity and the
Identification identifier
step
• Timestamps
• Requires that clocks among the various participants be synchronized
• Party A accepts a message as fresh only if the message contains a
timestamp that, in A’s judgment, is close enough to A’s knowledge of
current time
• Challenge/response
• Party A, expecting a fresh message from B, first sends B a nonce
(challenge) and requires that the subsequent message (response)
received from B contain the correct nonce value
© 2017 Pearson Education, Ltd., All rights reserved.
One-Way Authentication
One application for which
encryption is growing in A second requirement is
popularity is electronic that of authentication
mail (e-mail)
• Header of the e-mail message • The recipient wants some
must be in the clear so that assurance that the message is
the message can be handled from the alleged sender
by the store-and-forward
e-mail protocol, such as SMTP
or X.400
• The e-mail message should be
encrypted such that the mail-
handling system is not in
possession of the decryption
key
Scalable Transparent
• Ticket
• Created once the AS accepts the user as authentic; contains the user’s ID and
network address and the server’s ID
• Encrypted using the secret key shared by the AS and the server
Kerberos
Version 5
Flags
A markup
language that
Enables
uses sets of
applications to
embedded tags An XML-based
request services A set of SOAP
or labels to language for
from one extensions for
characterize the exchange of
another with implementing
text elements security
XML-based message
within a information
requests and integrity and
document so as between online
receive confidentiality
to indicate their business
responses as in Web services
appearance, partners
data formatted
function,
with XML
meaning, or
context
• SP 800-73-3—Interfaces for Personal Identity • SP 800-116—A Recommendation for the Use of PIV
Verification Credentials in Physical Access Control Systems
(PACS)
• Specifies the interfaces and card architecture
for storing and retrieving identity credentials • Describes a risk-based approach for selecting
from a smart card, and provides guidelines for appropriate PIV authentication mechanisms to
the use of authentication mechanisms and manage physical access to Federal
protocols government facilities and assets