Chapter 5 - Authentication
Chapter 5 - Authentication
04/03/2025 2
1
05/03/2025
Introduction
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
04/03/2025 3
2
05/03/2025
Authentication Authorization
Who are you?
How much can you spend?
Accounting
What did you spend it on?
04/03/2025 5
3
05/03/2025
Availability:
when the correct credentials are presented, the resources
should be made available to the processor (on behalf of the
user).
No false negatives:
if a process presents incorrect credentials but is given access
These should not happen.
No false positives:
if a process presents the correct credentials but is denied
access
These should not happen either
False negative
True positive
False positive
True negative
4
05/03/2025
5
05/03/2025
04/03/2025 12
6
05/03/2025
04/03/2025 14
7
05/03/2025
16
8
05/03/2025
17
9
05/03/2025
● areas of risk.
10
05/03/2025
Password-Based Authentication
The Vulnerability of Passwords
The Use of Hashed Passwords
Dynamic Passwords
Token-Based Authentication
Biometric Authentication
Passwordless authentication
21
04/03/2025 22
11
05/03/2025
04/03/2025 23
4. Workstation hijacking:
The attacker waits until a logged-in workstation is
unattended.
7. Electronic monitoring:
If a password is communicated across a network to log on
to a remote system, it is vulnerable to eavesdropping.
04/03/2025 24
12
05/03/2025
123456 696969
password 123123
letmein batman
abc123 qwerty
111111 123456789
13
05/03/2025
Bad Password
Merry Christmas
(Lengthen)
Merry Xmas
MerryChrisToYou
(Synonym)
(Intertwine
MerryJul
Letters) (convert vowels (Abbreviate)
to numeric)
MaryJul
(Keypad shift MerChr2You
Right …. Up)
MXemrarsy
GladJesBirth
M5rryXm1s Mary*Jul
Good
,rttuc,sd J3446sjqw
Password mErcHr2yOu
14
05/03/2025
Single Sign On (SSO) is the ability for a user to enter the same id and
password to logon to multiple applications within an enterprise.
Advantages Disadvantages
One good password replaces Single point of failure -> total compromise
Secondary Domains
Enter
Password
Primary Domain (System)
15
05/03/2025
04/03/2025 31
16
05/03/2025
password
Password file
UserID salt E(pwd, [salt,0])
Load
Loading password
17
05/03/2025
Password file
UserID UserID salt E(pwd, [salt,0])
salt
select password
hashed password
compare
Verifying pasword
Hash Functions
18
05/03/2025
04/03/2025 38
19
05/03/2025
04/03/2025 39
20
05/03/2025
04/03/2025 41
Password-Based Authentication
The Vulnerability of Passwords
The Use of Hashed Passwords
Dynamic Passwords
Token-Based Authentication
Biometric Authentication
Passwordless authentication
42
21
05/03/2025
Operation
Token Types:
o Card
o Token
04/03/2025 43
04/03/2025 44
22
05/03/2025
04/03/2025 46
23
05/03/2025
04/03/2025 47
04/03/2025 48
24
05/03/2025
04/03/2025 49
04/03/2025 50
25
05/03/2025
Password-Based Authentication
The Vulnerability of Passwords
The Use of Hashed Passwords
Token-Based Authentication
Biometric Authentication
51
Static, Dynamic
05/03/2025 52
26
05/03/2025
Enrollment
04/03/2025 53
27
05/03/2025
04/03/2025 55
04/03/2025 56
28
05/03/2025
Multi-factor authentication
● Uses more than one method
● Type password but also send a code via SMS
■ It goes to your phone (something you have)
■ Gmail implements this
● ATM card and a PIN
● Other things like your location
29
05/03/2025
04/03/2025 59
04/03/2025 60
30
05/03/2025
o Passcode W’
(synchronized with host)
o Password P’
(shared user and token, not host)
04/03/2025 61
04/03/2025 62
31
05/03/2025
04/03/2025 63
Kerberos
05/03/2025 64
32
05/03/2025
Kerberos
05/03/2025 65
05/03/2025 66
33
05/03/2025
05/03/2025 67
Characteristic
o use the authentication key (physical key, virtual key application
on smartphones) then activate the biometric key for
authentication.
o It is a big technology trend of the future because of outstanding
benefits in enhancing security efficiency,
o a major trend that inevitably creates the future for secure strong
authentication when most of the world's large corporations are
developing and using this technology such as Apple, Microsoft,
Samsung, Amazon.
04/03/2025 68
34
05/03/2025
04/03/2025 69
04/03/2025 70
35
05/03/2025
User’s device
creates a new
Public key is sent
public/private
to the online
key pair unique
service and
for the local
associated with
device, online
the user’s acc
service and user’s
05/03/2025 account 71
05/03/2025 72
36
05/03/2025
05/03/2025 73
1.
2.
04/03/2025 74
37
05/03/2025
04/03/2025 75
04/03/2025 76
38
05/03/2025
04/03/2025 77
04/03/2025 78
39
05/03/2025
04/03/2025 79
● Introduction
● Password-Based Authentication
● Token-Based Authentication
● Biometric Authentication
40