Unit 5 Authentication System
Unit 5 Authentication System
UNIT V
AUTHENTICATION
2 CONTENTS
1. The set A of authentication information is the set of specific information with which entities
prove their identities.
2. The set C of complementary information is the set of information that the system stores and
uses to validate the authentication information.
3. The set F of complementation functions that generate the complementary information from
the authentication information.That is, for f ∈ F, f: A → C.
4. The set L of authentication functions that verify identity. That is, for l ∈ L, l: A × C→{ true,
false }.
5. The set S of selection functions that enable an entity to create or alter the authentication
and complementary information.
6 EXAMPLE
A user authenticates himself by entering a password, which the system compares with the
cleartext passwords stored online. Here, A is the set of strings making up acceptable
passwords, C = A, F = { I }, and L = { eq }, where I is the identity function and eq is true if
its arguments are the same and false if they are not.
7 PASSWORDS
• A password is information associated with an entity that confirms the entity’s identity.
• Passwords are an example of an authentication mechanism based on what people know:
the user supplies a password, and the computer validates it. If the password is the one
associated with the user, that user’s identity is authenticated. If not, the password is
rejected and the authentication fails.
• The simplest password is some sequence of characters. In this case, the password space is
the set of all sequences of characters that can be passwords.
8
EXAMPLE:
• One installation requires each user to choose a sequence of 10 digits as a password.
Then A has 1010 elements (from “0000000000” to “9999999999”).
9 APPROACHES FOR PROTECTING THE PASSWORDS
• The name of this attack comes from the list of words (a “dictionary”) used for guesses.
The dictionary may be a set of strings in random order or (more usually) a set of strings
in decreasing order of probability of selection.
• If the complementary information and complementation functions are available, the
dictionary attack takes each guess g and computes f(g) for each f ∈ F. If f(g) corresponds
to the complementary information for entity E, then g authenticates E under f. This is a
dictionary attack type 1. If either the complementary information or the complementation
functions are unavailable, the authentication functions l ∈ L may be used. If the guess g
results in l returning true, g is the correct password.This is a dictionary attack type 2.
13 EXAMPLE
• Attackers often obtain a UNIX system’s password file and use the
(known) complementation function to test guesses. (Many programs such
as crack automate this process.) This is a type 1 attack. But the attackers
need access to the system to obtain the complementation data in the
password file. To gain access, they may try to guess a password using the
authentication function. They use a known account name (such as root)
and guess possible passwords by trying to log in.This is a type 2 attack
14 CHALLENGE-RESPONSE
• Passwords have the fundamental problem that they are reusable. If an attacker sees a
password, she can later replay the password. The system cannot distinguish between the
attacker and the legitimate user, and allows access. An alternative is to authenticate in
such a way that the transmitted password changes each time. Then, if an attacker replays
a previously used password, the system will reject it.
15 DEFINITION
• Biometrics is the automated measurement of biological or behavioral features that identify a person.
• Biometrics represent the "something you are" method of authentication or, as Schneier so aptly puts it, "you
are your key" .
• Whenever the user accesses the system, the biometric authentication mechanism verifies the identity.
• This is considerably easier than identifying the user because no searching is required. A comparison to the
known data for the claimed user’s identity will either verify or reject the claim.
• There are many different types of biometrics, including such long-established methods as fingerprints.
Recently, biometrics based on speech recognition, gait (walking) recognition, and even a digital doggie (odor
recognition) have been developed.
• Common characteristics are fingerprints, voice characteristics, eyes, facial features, and keystroke dynamics.
17 AN IDEAL BIOMETRIC WOULD SATISFY ALL OF THE
FOLLOWING:
• Universal — A biometric should apply to virtually everyone. In reality, no biometric applies
to everyone. For example, a small percentage of people do not have readable fingerprints.
• Distinguishing — A biometric should distinguish with virtual certainty.
• Permanent — Ideally, the physical characteristic being measured should never change. In
practice, it's sufficient if the characteristic remains stable over a reasonably long period of
time
• Collectable — The physical characteristic should be easy to collect without any potential to
cause harm to the subject. In practice, collectability often depends heavily on whether the
subject is cooperative or not.
18
• First, there is an enrollment phase, where subjects have their biometric information
gathered and entered into a database. Typically, during this phase very careful
measurement of the pertinent physical information is required. Since this is one-time
work (per subject), it's acceptable if the process is slow and multiple measurements are
required.
• The second phase in a biometric system is the recognition phase. This occurs when the
biometric detection system is used in practice to determine whether (for the
authentication problem) to authenticate the user or not. This phase must be quick,
simple, and accurate.
20 TYPES OF ERRORS
There are two types of errors that can occur in biometric recognition.
• Suppose Bob poses as Alice and the system mistakenly authenticates Bob as Alice. The
rate at which such misauthentication occurs is the fraud rate.
• Now suppose that Alice tries to authenticate as herself, but the system fails to
authenticate her.The rate at which this type of error occurs is the insult rate.
• For example, if we require a 99% voiceprint match, then we can obtain a low fraud rate,
but the insult rate will be high, since a speaker’s voice will naturally change slightly from
time to time.
21
• The equal error rate is the rate for which the fraud and insult rates are the same. That
is, the parameters of the system are adjusted until the fraud rate and insult rate are
precisely in balance.
22 BIOMETRIC EXAMPLES
• Fingerprints.
• Hand Geometry
• Iris Scan
23 FINGERPRINTS.
• A fingerprint biometric works by first capturing an image of the fingerprint. The image is
then enhanced using various image-processing techniques, and various points are
identified and extracted from the enhanced image as shown in fig.
24
• The points extracted by the biometric system are compared in a manner that is
somewhat analogous to the manual analysis of fingerprints.
• For authentication, the extracted points are compared with the claimed user's stored
information, which was previously captured during the enrollment phase. The system then
determines whether a statistical match occurs, with some predetermined level of
confidence.
25 HAND GEOMETRY
• The shape of the hand is carefully measured, including the width and length of the hand
and fingers.
• Human hands are not nearly as unique as fingerprints, but hand geometry is easy and
quick to measure, while being sufficiently robust for many authentication uses.
• One advantage of hand geometry systems is that they are fast, taking less than one
minute in the enrollment phase and less than five seconds in the recognition phase.
Another advantage is that human hands are symmetric, so if the enrolled hand is, say, in a
cast, the other hand can be used by placing it palm side up. Some disadvantages of hand
geometry include that it cannot be used on the young or the very old.
26
27 IRIS SCAN
• one of the best for authentication is the iris scan. The development of the iris (the
colored part of the eye) is chaotic, which implies that minor variations lead to large
differences. There is little or no genetic influence on the iris pattern, so that the
measured pattern is uncorrelated for identical twins and even for the two eyes of one
individual.
• Another desirable property is that the pattern is stable throughout a lifetime
28
• Iris scan systems require sophisticated equipment and software. First, an automated iris
scanner locates the iris. Then a black and white photo of the eye is taken. The resulting
image is processed using a two-dimensional wavelet transform, the result of which is a
256-byte (that is, 2048-bit) iris code.
• Two iris codes are compared based on the Hamming distance between the codes.
Suppose that Alice is trying to authenticate using an iris scan. Let x be the iris code
computed from Alice's iris in the recognition phase, while y is Alice's iris code stored in
the scanner's database, which was gathered during the enrollment phase.
29
• Any authentication method that requires two out of the three "somethings" is known as
two-factor authentication. Another example of a two-factor authentication is an ATM card,
where the user must have the card and know the PIN number.
• Other examples of two-factor authentication include a credit card together with a
signature, a biometric thumbprint system that also requires a password, and a cell phone
that requires a PIN
32 NEEDHAM–SCHROEDER PROTOCOL
• The goal of the protocol is to establish mutual authentication between two parties A and B in the
presence of adversary, who can
• Intercept messages;
• Delay messages;
• Read and copy messages;
• Generate messages,
But who does not know secret keys of principals, which they share with the authentication server S.
A and B obtain a secret shared key though authentication server S.
The protocol uses shared keys encryption/decryption
33
• Here,Alice (A) initiates the communication to Bob (B). S is a server trusted by both parties.
• In the communication:
• A and B are identities of Alice and Bob respectively
• KAS is a symmetric key known only to A and S
• KBS is a symmetric key known only to B and S
• NA and NB are nonces generated by A and B respectively
• KAB is a symmetric, generated key, which will be the session key of the session between A and
B
35
36 ATTACKS ON THE PROTOCOL
• The protocol is vulnerable to a replay attack .If an attacker uses an older, compromised
value for KAB, he can then replay the message { KAB,A}KBS to Bob who will accept it,
being unable to tell that the key is not fresh.
37
KERBEROS
• Later the client can use this TGT to get additional tickets from TGS without resorting
to using the shared secret. These tickets can be used to prove authentication to SS.