2 Authentication - Access Control & Cryptography
2 Authentication - Access Control & Cryptography
COMPUTING,
FIFTH EDITION
Chapter 2: Toolbox: Authentication, Access
Control, and Cryptography
Objectives for Chapter 2
• Survey authentication mechanisms
• List available access control implementation options
• Explain the problems encryption is designed to solve
• Understand the various categories of encryption tools as
well as the strengths, weaknesses, and applications of
each
• Learn about certificates and certificate authorities
Authentication
• Identification is the act of establishing who user
claims to be.
• Involves some unique identifier-user name, email,
emp. Id.
• Helps to distinguish one user from another.
• Authentication is the process of verifying the
Claim identity of a user.
• Authentication confirms that you are who you
purport to be
• Eg: Pswd, PINs, Biometrics, etc.
Identification Versus Authentication
• Identities are typically public or well known. Authentication
should be private
• Identities -often well known, predictable, or guessable - If you
send email to someone, you implicitly send along your email
account ID so the other person can reply to you
• Authentication, on the other hand, should be reliable;
otherwise, not secure
• Authentication Methods/ mechanisms/ three qualities
to confirm a user’s identity (Diff. Methods of
Authentication):
• Something the user knows
• Something the user is
• Something user has
Something You Know
• Something the user knows: Passwords, PIN numbers,
passphrases, a secret handshake, and mother’s
maiden name, Security questions
• Something the user is: biometrics, are based on a
physical characteristic of the user, such as a fingerprint,
the pattern of a person’s voice, or a face (picture)
• Something the user has: Identity badges, physical keys,
a driver’s license, or a uniform are common examples of
things people have that make them recognizable.
Two or more forms can be combined; for example, a
bank card and a PIN combine something the user has
(the card) with something the user knows (the PIN)
Classification of user authentication
• 1. Knowledge based authentication
• 2. Object based authentication
• 3. Bio metric authentication
Knowledge based authentication
Knowledge based authentication
• Highly used
• Passwords-simple, inexpensive and portable
• Other Example: Passphrases, graphical
passwords, PINs, Digital Signature, etc.
• Disadvantages:
1. Easy to crack.
2. Tough to recall.
3. Sometime easy to guess.
4. Multiple application- difficult to guess
Rules to improve password security
• Pswds should not be shared or written down
• No. of unsuccessful authentication attempts should
be limited by the system.
• Pswds should never be stored in clear text, they
should be encrypted.
• OTP
• Different categories of passwords:
• Primary passwords –System or user generated
• Secondary passwords-Sensitive application
• Question and Answer methods
Q and A passwords
• Two types
1. Cognitive Password: based on opinion based question
2. Associative Password: Based on word associations.
Classification of passwords
3. Strong
4. Weak
5. Medium
• All are very poor form of authentication.
They can be easily cracked or hacked with the following attacks
1. Guessing
2. Brute force attack
3. Dictionary attack
Several Other Challenges
• Multiple passwords or a passwords that needs to be
continuously changed-Very hard to remember by the user.
Plaintext Concealed
• Converting a password to its concealment form is simple, but
going the other way (starting with a concealed version and
deriving the corresponding password) is effectively impossible.
Stream Block
Advantages Sp eed of High d iffu s ion
t ra n s fo r m a t ion Im m u n it y t o
Low err or in s ert ion of
p r o p a ga t ion s ym b o l
• Attacker can certainly change the plaintext, but the attacker does not
have a key with which to re-compute the checksum.
• E.g. employ any non-cryptographic checksum function to derive an n-
bit digest of the sensitive data
Characteristics of Signatures:
A digital signature must meet two primary conditions:
• It must be unforgeable. If person S signs message M with signature Sig(S,M),
no one else can produce the pair [M,Sig(S,M)].
• It must be authentic. If a person R receives the pair [M, Sig(S,M)] purportedly
from S, R can check that the signature is really from S. Only S could have
created this signature, and the signature is firmly attached to M.
Digital Signature
Additional characteristics of Signatures: