0% found this document useful (0 votes)
44 views

Unit 5 Authentication System

This document discusses various authentication methods including password-based authentication, challenge-response authentication, and biometric authentication. It describes how password-based systems can be attacked via dictionary attacks and highlights weaknesses like passwords being reusable. Challenge-response authentication aims to address this by having the system send a random challenge that the user must respond to correctly. Biometric authentication uses unique physical or behavioral traits to verify identity. Common biometrics discussed include fingerprints, iris scans, and voice recognition.

Uploaded by

shrestharojesh34
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Unit 5 Authentication System

This document discusses various authentication methods including password-based authentication, challenge-response authentication, and biometric authentication. It describes how password-based systems can be attacked via dictionary attacks and highlights weaknesses like passwords being reusable. Challenge-response authentication aims to address this by having the system send a random challenge that the user must respond to correctly. Biometric authentication uses unique physical or behavioral traits to verify identity. Common biometrics discussed include fingerprints, iris scans, and voice recognition.

Uploaded by

shrestharojesh34
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

1

UNIT V
AUTHENTICATION
2 CONTENTS

5.1. Authentication System,


5.2. Password Based Authentication, Dictionary Attacks,
5.3. Challenge Response System,
5.4. Biometric System
5.5. Needham-Schroeder Scheme, Kerberos Protocol
3 AUTHENTICATION BASICS

• Authentication is the binding of an identity to a subject,


• The external entity must provide information to enable the system to confirm its identity.
This information comes from one (or more) of the following
1) What the entity knows (such as passwords or secret information)
2) What the entity has (such as a badge or card)
3) What the entity is (such as fingerprints or retinal characteristics)
4) Where the entity is (such as in front of a particular terminal)
4

• The authentication process consists of obtaining the authentication information from an


entity, analyzing the data, and determining if it is associated with that entity. This means
that the computer must store some information about the entity. It also suggests that
mechanisms for managing the data are required.
5 COMPONENTS OF AUTHENTICATION SYSTEM

1. The set A of authentication information is the set of specific information with which entities
prove their identities.
2. The set C of complementary information is the set of information that the system stores and
uses to validate the authentication information.
3. The set F of complementation functions that generate the complementary information from
the authentication information.That is, for f ∈ F, f: A → C.
4. The set L of authentication functions that verify identity. That is, for l ∈ L, l: A × C→{ true,
false }.
5. The set S of selection functions that enable an entity to create or alter the authentication
and complementary information.
6 EXAMPLE

A user authenticates himself by entering a password, which the system compares with the
cleartext passwords stored online. Here, A is the set of strings making up acceptable
passwords, C = A, F = { I }, and L = { eq }, where I is the identity function and eq is true if
its arguments are the same and false if they are not.
7 PASSWORDS

• A password is information associated with an entity that confirms the entity’s identity.
• Passwords are an example of an authentication mechanism based on what people know:
the user supplies a password, and the computer validates it. If the password is the one
associated with the user, that user’s identity is authenticated. If not, the password is
rejected and the authentication fails.
• The simplest password is some sequence of characters. In this case, the password space is
the set of all sequences of characters that can be passwords.
8

EXAMPLE:
• One installation requires each user to choose a sequence of 10 digits as a password.
Then A has 1010 elements (from “0000000000” to “9999999999”).
9 APPROACHES FOR PROTECTING THE PASSWORDS

1. Hide enough information so that one of a, c, or f cannot be


found.
EXAMPLE: Many UNIX systems make the files containing complementation information
readable only by root. These schemes, which use shadow password files, make the set of
complements c in actual use unknown. Hence, there is insufficient information to determine
whether or not f(a) is associated with a user. Similarly, other systems make the set of
complementation functions F unknown; again, the computation of the value f(a) is not
possible.
10

2. Prevent access to the authentication functions L.


EXAMPLE: One site does not allow the root user to log in from a network. The login
functions exist but always fail. Hence, one cannot test authentication of root with access to
these functions over a network.
11 ATTACKING A PASSWORD SYSTEM

• The simplest attack against a password-based system is to guess passwords.


12 DICTIONARY ATTACK

• The name of this attack comes from the list of words (a “dictionary”) used for guesses.
The dictionary may be a set of strings in random order or (more usually) a set of strings
in decreasing order of probability of selection.
• If the complementary information and complementation functions are available, the
dictionary attack takes each guess g and computes f(g) for each f ∈ F. If f(g) corresponds
to the complementary information for entity E, then g authenticates E under f. This is a
dictionary attack type 1. If either the complementary information or the complementation
functions are unavailable, the authentication functions l ∈ L may be used. If the guess g
results in l returning true, g is the correct password.This is a dictionary attack type 2.
13 EXAMPLE

• Attackers often obtain a UNIX system’s password file and use the
(known) complementation function to test guesses. (Many programs such
as crack automate this process.) This is a type 1 attack. But the attackers
need access to the system to obtain the complementation data in the
password file. To gain access, they may try to guess a password using the
authentication function. They use a known account name (such as root)
and guess possible passwords by trying to log in.This is a type 2 attack
14 CHALLENGE-RESPONSE

• Passwords have the fundamental problem that they are reusable. If an attacker sees a
password, she can later replay the password. The system cannot distinguish between the
attacker and the legitimate user, and allows access. An alternative is to authenticate in
such a way that the transmitted password changes each time. Then, if an attacker replays
a previously used password, the system will reject it.
15 DEFINITION

• Let user U desire to authenticate himself to system S. Let U and S have an


agreed-on secret function f. A challenge-response authentication system is
one in which S sends a random message m (the challenge) to U, and U
replies with the transformation r = f(m) (the response). S validates r by
computing it separately.
16 BIOMETRICS

• Biometrics is the automated measurement of biological or behavioral features that identify a person.
• Biometrics represent the "something you are" method of authentication or, as Schneier so aptly puts it, "you
are your key" .
• Whenever the user accesses the system, the biometric authentication mechanism verifies the identity.
• This is considerably easier than identifying the user because no searching is required. A comparison to the
known data for the claimed user’s identity will either verify or reject the claim.
• There are many different types of biometrics, including such long-established methods as fingerprints.
Recently, biometrics based on speech recognition, gait (walking) recognition, and even a digital doggie (odor
recognition) have been developed.
• Common characteristics are fingerprints, voice characteristics, eyes, facial features, and keystroke dynamics.
17 AN IDEAL BIOMETRIC WOULD SATISFY ALL OF THE
FOLLOWING:
• Universal — A biometric should apply to virtually everyone. In reality, no biometric applies
to everyone. For example, a small percentage of people do not have readable fingerprints.
• Distinguishing — A biometric should distinguish with virtual certainty.
• Permanent — Ideally, the physical characteristic being measured should never change. In
practice, it's sufficient if the characteristic remains stable over a reasonably long period of
time
• Collectable — The physical characteristic should be easy to collect without any potential to
cause harm to the subject. In practice, collectability often depends heavily on whether the
subject is cooperative or not.
18

• Reliable, robust, and user-friendly.


19 PHASES TO A BIOMETRIC SYSTEM

• First, there is an enrollment phase, where subjects have their biometric information
gathered and entered into a database. Typically, during this phase very careful
measurement of the pertinent physical information is required. Since this is one-time
work (per subject), it's acceptable if the process is slow and multiple measurements are
required.
• The second phase in a biometric system is the recognition phase. This occurs when the
biometric detection system is used in practice to determine whether (for the
authentication problem) to authenticate the user or not. This phase must be quick,
simple, and accurate.
20 TYPES OF ERRORS

There are two types of errors that can occur in biometric recognition.
• Suppose Bob poses as Alice and the system mistakenly authenticates Bob as Alice. The
rate at which such misauthentication occurs is the fraud rate.
• Now suppose that Alice tries to authenticate as herself, but the system fails to
authenticate her.The rate at which this type of error occurs is the insult rate.
• For example, if we require a 99% voiceprint match, then we can obtain a low fraud rate,
but the insult rate will be high, since a speaker’s voice will naturally change slightly from
time to time.
21

• The equal error rate is the rate for which the fraud and insult rates are the same. That
is, the parameters of the system are adjusted until the fraud rate and insult rate are
precisely in balance.
22 BIOMETRIC EXAMPLES

• Fingerprints.
• Hand Geometry
• Iris Scan
23 FINGERPRINTS.

• A fingerprint biometric works by first capturing an image of the fingerprint. The image is
then enhanced using various image-processing techniques, and various points are
identified and extracted from the enhanced image as shown in fig.
24

• The points extracted by the biometric system are compared in a manner that is
somewhat analogous to the manual analysis of fingerprints.
• For authentication, the extracted points are compared with the claimed user's stored
information, which was previously captured during the enrollment phase. The system then
determines whether a statistical match occurs, with some predetermined level of
confidence.
25 HAND GEOMETRY

• The shape of the hand is carefully measured, including the width and length of the hand
and fingers.
• Human hands are not nearly as unique as fingerprints, but hand geometry is easy and
quick to measure, while being sufficiently robust for many authentication uses.
• One advantage of hand geometry systems is that they are fast, taking less than one
minute in the enrollment phase and less than five seconds in the recognition phase.
Another advantage is that human hands are symmetric, so if the enrolled hand is, say, in a
cast, the other hand can be used by placing it palm side up. Some disadvantages of hand
geometry include that it cannot be used on the young or the very old.
26
27 IRIS SCAN

• one of the best for authentication is the iris scan. The development of the iris (the
colored part of the eye) is chaotic, which implies that minor variations lead to large
differences. There is little or no genetic influence on the iris pattern, so that the
measured pattern is uncorrelated for identical twins and even for the two eyes of one
individual.
• Another desirable property is that the pattern is stable throughout a lifetime
28

• Iris scan systems require sophisticated equipment and software. First, an automated iris
scanner locates the iris. Then a black and white photo of the eye is taken. The resulting
image is processed using a two-dimensional wavelet transform, the result of which is a
256-byte (that is, 2048-bit) iris code.
• Two iris codes are compared based on the Hamming distance between the codes.
Suppose that Alice is trying to authenticate using an iris scan. Let x be the iris code
computed from Alice's iris in the recognition phase, while y is Alice's iris code stored in
the scanner's database, which was gathered during the enrollment phase.
29

• Then x and y are compared by computing the distance d(x, y) defined by

For example, d(0010,0101) = 3/4


30
31 TWO-FACTOR AUTHENTICATION

• Any authentication method that requires two out of the three "somethings" is known as
two-factor authentication. Another example of a two-factor authentication is an ATM card,
where the user must have the card and know the PIN number.
• Other examples of two-factor authentication include a credit card together with a
signature, a biometric thumbprint system that also requires a password, and a cell phone
that requires a PIN
32 NEEDHAM–SCHROEDER PROTOCOL

• The goal of the protocol is to establish mutual authentication between two parties A and B in the
presence of adversary, who can
• Intercept messages;
• Delay messages;
• Read and copy messages;
• Generate messages,
But who does not know secret keys of principals, which they share with the authentication server S.
A and B obtain a secret shared key though authentication server S.
The protocol uses shared keys encryption/decryption
33

• The Needham–Schroeder Symmetric Key Protocol, based on a symmetric encryption


algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish
a session key between two parties on a network, typically to protect further
communication.
• The Needham–Schroeder Public-Key Protocol, based on public-key cryptography. This
protocol is intended to provide mutual authentication between two parties
communicating on a network
34 THE SYMMETRIC PROTOCOL

• Here,Alice (A) initiates the communication to Bob (B). S is a server trusted by both parties.
• In the communication:
• A and B are identities of Alice and Bob respectively
• KAS is a symmetric key known only to A and S
• KBS is a symmetric key known only to B and S
• NA and NB are nonces generated by A and B respectively
• KAB is a symmetric, generated key, which will be the session key of the session between A and
B
35
36 ATTACKS ON THE PROTOCOL

• The protocol is vulnerable to a replay attack .If an attacker uses an older, compromised
value for KAB, he can then replay the message { KAB,A}KBS to Bob who will accept it,
being unable to tell that the key is not fresh.
37
KERBEROS

• Implement the idea of Needham-Schroeder protocol


• Kerberos is a network authentication protocol
• Provides authentication and secure communication
• Relies entirely on symmetric cryptography
• Developed at MIT: two versions,Version 4 and Version 5 (specified as
RFC1510)
• http://web.mit.edu/kerberos/www
• Used in many systems, e.g., Windows 2000 and later as default
authentication protocol
38
KERBEROS OVERVIEW

• One issue of Needham-Schroeder


• Needs the key each time a client talks with a service

• Solution: Separates TTP into an AS and a TGT.


• The client authenticates to AS using a long-term shared secret and receives a TGT.
• supports single sign-on

• Later the client can use this TGT to get additional tickets from TGS without resorting
to using the shared secret. These tickets can be used to prove authentication to SS.

AS = Authentication Server TGS = Ticket Granting Server


SS = Service Server TGT = Ticket Granting Ticket
OVERVIEW OF KERBEROS
39
40
KERBEROS DRAWBACK

• Single point of failure:


• requires online Trusted Third Party: Kerberos server

• Security partially depends on tight clock synchronization. Convenience requires loose


clock synchronization
• Use timestamp in the protocol
• The default configuration requires synchronization to with 10 minutes.

• Useful primarily inside an organization


• Does it scale to Internet? What is the main difficulty?

You might also like