Handout 5 - User Authentication
Handout 5 - User Authentication
User Authentication
Digital User Authentication
NIST SP 800-63-3 (Digital Authentication Guideline, October
2016) defines digital user authentication as:
• Password, PIN,
answers to • Smartcard, • Fingerprint,
prearranged electronic retina, face
questions • Voice pattern,
keycard, handwriting,
physical key typing rhythm
Multifactor Authentication
Authentication
logic using Authentication
f rst factor logic using
second factor
ol on
ol on
oc t i
oc t i
ot ica
ot ica
pr ent
pr ent
th
th
Au
Au
Pass Pass
Fail Fail
Client Client
Potential
impact
Areas of
risk
Assurance Level
Offline Password
guessing Workstation Electronic
dictionary against hijacking monitoring
attack single user
Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
Password Vulnerabilities (2)
Offline dictionary attack:
strong access controls protect password files
hackers frequently bypass such controls and obtain system password file and compare
password hashes against hashes of commonly used passwords
If match found attacker gains access by that ID/password combination
Countermeasures: prevent unauthorized access to password file, intrusion detection to
identify compromises, and rapid re-issuance of passwords
Workstation hijacking:
Unattended logged-in workstation
Countermeasure: logging out after period of inactivity
Electronic monitoring:
passwords communicated across networks are vulnerable to
eavesdropping
Simple encryption will not fix this encrypted password can be
reused
User ID Salt Hash code
Salt
Hashed Passwords – •
Password File
User id
User ID Salt Hash code
Salt
Password
Password File
Select Password
User ID Salt Hash code
Salt
•
slow hash Load •
function • slow hash
function
Hashed password
Compare
(a) Loading a new password
(b) Verifying a password
Password File
User id
User ID Salt Hash code
secure against
Figure 3.3 UNIX Password Scheme
many cryptanalytic
Salt
attacks
Select Password
Salt Benefits
The salt serves three purposes:
It prevents duplicate passwords from being visible in
the password file. Even if two users choose the
same password, those passwords will be assigned
different salt values. Hence, the hashed passwords
of the two users will differ.
It greatly increases the difficulty of offline dictionary
attacks. For a salt of length b bits, the number of
possible passwords is increased by a factor of 2b,
increasing the difficulty of guessing a password in a
dictionary attack.
It becomes nearly impossible to find out whether a
person with passwords on two or more systems has
used the same password on all of them.
UNIX Implementation
Original scheme
• Up to eight printable characters in length
• 12-bit salt used to modify DES
encryption into a one-way hash function
• Zero value repeatedly encrypted 25 times
• Output translated to 11 character
sequence
Now regarded as
inadequate
• Still often required for compatibility with
existing account management software
or multivendor environments
Improved Implementations
Recommended hash
function is based on
MD5
•Salt of up to 48-bits
•Password length is unlimited
•Produces 128-bit hash
•Uses an inner loop with 1000
iterations to achieve slowdown
Password Cracking
50%
40%
Percent guessed
30%
20%
10%
0%
104 107 1010 1013
Number of guesses
Make
available
only to
Vulnerabilities
privileged
users
Can serve the same purposes as other Has human-readable data printed on
national ID cards, and similar cards such as a
driver’s license, for access to government and
its surface
commercial services • Personal data: ex: name, date of birth, and
address
• Document number: An alphanumerical nine-
character unique identifier
• Card access number (CAN): ): A six-digit
Can provide stronger proof of identity and decimal random number printed on face of card
can be used in a wider variety of applications (used as password)
• Machine readable zone (MRZ): Three lines of
human- and machine-readable text on the back
of the card (used as password)
In effect, is a smart card that has been
verified by the national government as valid
and authentic
Electronic Functions and Data for
eID Cards
est
io n re q u
t
ntica
. A uthe
4 t ge
r e que s l e xchan eID
N oco
5. PI prot rect
ic at ion
f or redi server
nt sult
ut he n re
7. A at io
6. User enters PIN ntic
. Aut he
8
2. Se
rvic
e re q
1. User requests service 3. R uest
(e.g., via Web browser) edir
ect t
9. A o eID
uthe mes
ntica sage
tion
10. S resu
ervi lt fo
ce g r wa
rant rded
ed
Host/application
server
User interface
Figure 3.9 A user's identity
Generic or System.Feature
Biometric Enrollment creates (c) Identification
"user
an association unidentified"
between matcher
a user and the user's biometric N templates
characteristics. Depending on the application, user
Remote User Authentication
Authentication over a network, the Internet, or a
communications link is more complex
Additional security threats such as:
Eavesdropping, capturing a password, replaying an
authentication sequence that has been observed
Generally rely on some form of a challenge-response
protocol to counter threats
Remote User Authentication –
Basic Challenge-Response Protocol
Client Client
Host Host
U U
U, User U, User
r, random number r, random number
(r, h(), f()) h(), f(), functions (r, h(), f()) h(), f(), functions
P’ P’ W’
r’, return of r password to
f(r’, h(P’))
passcode via token
r’, return of r f(r’, h(W’))
if f(r’, h(P’)) =
f(r, h(P(U))) if f(r’, h(W’)) =
yes/no then yes else no f(r, h(W(U)))
yes/no then yes else no
Client Client
Host Host
U U
U, User U, User
r, random number r, random number
(r, E()) E(), function x, random sequence
challenge
(r, x, E())
B’ BT’ biometric E(), function
D‘ biometric device B’, x’ BS’(x’)
E(r’, D’, BT’) E(r’, BS’(x’))
r’, return of r r’, return of r
E–1E(r’, P’, BT’) = E–1E(r’, BS’(x’)) =
(r’, P’, BT’) (r’, BS’(x’))
if r’ = r AND D’ = D extract B’
AND BT’ = BT(U) from (r’, BS’(x’))
then yes else no if r’ = r AND x’ = x
yes/no
AND B’ = B(U)
yes/no then yes else no
(c) Protocol for static biometric (d) Protocol for dynamic biometric