CH03-CompSec4e
CH03-CompSec4e
Principles and
Practice
Fourth Edition
Areas of
risk
Assurance Level
More
specifically is
Four levels
defined as: of assurance
Describes an
organization’s Level 1
degree of The degree of
confidence in the
• Little or no confidence in the
asserted identity's validity
certainty that a vetting process used
to establish the
user has identity of the Level 2
individual to whom the
presented a credential was issued
• Some confidence in the
asserted identity’s validity
credential that
refers to his or Level 3
• High confidence in the
her identity The degree of
confidence that the
asserted identity's validity
Exploitin
Specific Popular Exploiting g
account password user multiple
attack attack mistakes passwor
d use
UNIX Implementation
Original scheme
• Up to eight printable characters in
length
• 12-bit salt used to modify DES
encryption into a one-way hash function
• Zero value repeatedly encrypted 25
times
• Output translated to 11 character
sequence
Now regarded as
inadequate
• Still often required for compatibility with
existing account management software
or multivendor environments
Improved
Implementations
OpenBSD uses Blowfish
block cipher based hash
algorithm called Bcrypt
• Most secure version of Unix
Much stronger hash/salt hash/salt scheme
schemes available for • Uses 128-bit salt to create
Unix 192-bit hash value
Recommended hash
function is based on
MD5
• Salt of up to 48-bits
• Password length is unlimited
• Produces 128-bit hash
• Uses an inner loop with 1000
iterations to achieve
slowdown
Password Cracking
Dictionary attacks Rainbow table
• Develop a large attacks
dictionary of possible • Pre-compute tables of
passwords and try hash values for all salts
each against the • A mammoth table of
password file hash values
• Each password must • Can be countered by
be hashed using each using a sufficiently
salt value and then large salt value and a
compared to stored sufficiently large hash
hash values length
Make
available
only to
Vulnerabilities
privileged
users
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Table 3.3
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Electronic Identity
Cards (eID)
Use of a smart card as a Most advanced deployment is
national identity card for the German card neuer
citizens Personalausweis
Can serve the same purposes as other Has human-readable data printed on its
national ID cards, and similar cards such surface
as a driver’s license, for access to • Personal data
government and commercial services • Document number
• Card access number (CAN)
• Machine readable zone (MRZ)
Electronic
Functions
and Data
for
eID Cards
For offline
applications, either
the MRZ printed on
For online the back of the card
applications, access or the six-digit card
is established by the access number
Ensures that the user entering the 6- (CAN) printed on the
contactless RF chip digit PIN (which front is used
in the eID card should only be
cannot be read known to the holder
without explicit of the card)
access control
Biometric
Authentication
• Attempts to authenticate an individual based on
unique physical characteristics
• Based on pattern recognition
• Is technically complex and expensive when
compared to passwords and tokens
• Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Remote User
Authentication
• Authentication over a network, the
Internet, or a communications link is more
complex
• Additional security threats such as:
o Eavesdropping, capturing a password,
replaying an authentication sequence that
has been observed