Chap 8
Chap 8
Authentication Protocols
2013 Term 2
Protocol
Part 3 Protocols
3
Ideal Security Protocol
Efficient
Small computational requirement
Not fragile
Works when attacker tries to break it
Part 3 Protocols
4
ATM Machine Protocol
Part 3 Protocols
5
Authentication Protocols
Part 3 Protocols
6
Authentication
Part 3 Protocols
7
Authentication
Authentication on a stand-alone
computer is relatively simple
Secure path” is an issue“
Attacks on authentication software
Authentication over a network is
challenging
Attacker can passively observe messages
Attacker can replay messages
Active attacks possible (insert, delete,
change)
Part 3 Protocols
8
Simple Authentication
”I’m Alice“
Prove it
Alice Bob
”I’m Alice“
Prove it
Alice Bob
Trudy
Part 3 Protocols
Authentication Attack
”I’m Alice“
Prove it
Part 3 Protocols
Simple Authentication
Alice Bob
Part 3 Protocols
Better Authentication
”I’m Alice“
Prove it
h(Alice’s password)
Alice Bob
Part 3 Protocols
Challenge-Response
Part 3 Protocols
Challenge-Response
”I’m Alice“
Nonce
Part 3 Protocols
Generic Challenge-Response
”I’m Alice“
Nonce
Part 3 Protocols
Symmetric Key Notation
Part 3 Protocols
Authentication: Symmetric Key
Part 3 Protocols
Authentication with Symmetric Key
”I’m Alice“
E(R,K)
Alice, K Bob, K
Part 3 Protocols
Mutual Authentication?
I’m Alice”, R“
E(R,K)
E(R,K)
Alice, K Bob, K
Part 3 Protocols
Mutual Authentication
RB, E(RA, K)
E(RB, K)
Alice, K Bob, K
Part 3 Protocols
Mutual Authentication Attack
I’m Alice”, RA“ .1
RB, E(RA, K) .2
E(RB, K) .5
Trudy Bob, K
RC, E(RB, K) .4
Trudy Bob, K
Part 3 Protocols
Mutual Authentication
Part 3 Protocols
Symmetric Key Mutual
Authentication
RB, E(“Bob”,RA,K)
E(“Alice”,RB,K)
Alice, K Bob, K
Part 3 Protocols
Public Key Notation
Alice = M}Alice]M[{
”I’m Alice“
Alice }R{
Alice Bob
Part 3 Protocols
Public Key Authentication
”I’m Alice“
Alice ]R [
Alice Bob
Part 3 Protocols
Public Keys
signatures
Part 3 Protocols
Session Key
I’m Alice”, R“
Alice }R,K{
Bob }R +1,K{
Alice Bob
I’m Alice”, R“
Bob ]R,K[
Alice ]R +1,K[
Alice Bob
Part 3 Protocols
Public Key Authentication and Session
Key
I’m Alice”, R“
}
Alice Bob ]R,K[{
}
Bob Alice ]R +1,K[{
Alice Bob
I’m Alice”, R“
]
Bob Alice }R,K{[
]
Alice Bob}R +1,K{[
Alice Bob
Part 3 Protocols
Perfect Forward Secrecy
…”Consider this “issue
Alice encrypts message with shared key K
and sends ciphertext to Bob
Trudy records ciphertext and later attacks
Alice’s (or Bob’s) computer to recover K
Then Trudy decrypts recorded messages
Perfect forward secrecy (PFS): Trudy
cannot later decrypt recorded
ciphertext
Even if Trudy gets key K or other secret(s)
?Is PFS possible
Part 3 Protocols
Perfect Forward Secrecy
Part 3 Protocols
Naïve Session Key Protocol
E(KS, K)
E(messages, KS)
Alice, K Bob, K
ga mod p
gb mod p
Alice, a Bob, b
Part 3 Protocols
Perfect Forward Secrecy
E(ga mod p, K)
E(gb mod p, K)
Alice: K, a Bob: K, b
Alice Bob
}
Alice Bob ]T +1, K[{
Alice Bob
Part 3 Protocols
Public Key Authentication with
Timestamp T
] }T +1, K{[
Bob Alice
Alice Bob
]
Bob Trudy }T +1, K{[
Trudy Bob
Part 3 Protocols
Public Key Authentication
Part 3 Protocols
Public Key Authentication with
Timestamp T
] }T +1{[
Bob Alice
Alice Bob
Part 3 Protocols
Authentication and TCP
Part 3 Protocols
TCP-based Authentication
Part 3 Protocols
TCP 3-way Handshake
SYN, SEQ a
Alice Bob
Recall the TCP three way handshake
Initial SEQ numbers, SEQ a and SEQ b
o Supposed to be random
If not…
…
SYN, SEQ = t (as .3
Trudy Alice) Bob
ACK = b2+1, data . 5
.5 .4
b2
=
.5 Q
, SE
1
.5 t+
=
ACK
Alice N ,
.5 SY
Part 3 Protocols
TCP Authentication Attack
Part 3 Protocols
TCP Authentication Attack
Part 3 Protocols
Zero Knowledge Proofs
Part 3 Protocols
Zero Knowledge Proof (ZKP)
then Alice could come out from the correct side with probability 1/2…
If Bob repeats this n times, then Alice (who does not know secret) can only
fool Bob with probability 1/2n
Part 3 Protocols
Best Authentication Protocol?
…It depends on
The sensitivity of the application/data
The delay that is tolerable
The cost (computation) that is tolerable
What crypto is supported (public key,
symmetric key, …)
Whether mutual authentication is required
Whether PFS, anonymity, etc., are concern
and possibly other factors…
Part 3 Protocols