CH03
CH03
User Authentication
NIST SP 800-63-3 (Digital
Authentication Guideline, October
2016) defines digital user
authentication as:
Areas of
risk
Assurance Level
More
specifically is
Four levels
defined as: of assurance
Describes an
organization’s Level 1
degree of The degree of
confidence in the
• Little or no confidence in the
asserted identity's validity
certainty that a vetting process used
to establish the
user has identity of the Level 2
individual to whom the
presented a credential was issued
• Some confidence in the
asserted identity’s validity
credential that
refers to his or Level 3
• High confidence in the
her identity The degree of
confidence that the
asserted identity's validity
Exploitin
Specific Popular Exploiting g
account password user multiple
attack attack mistakes passwor
d use
UNIX Implementation
Original scheme
• Up to eight printable characters in
length
• 12-bit salt used to modify DES
encryption into a one-way hash function
• Zero value repeatedly encrypted 25
times
• Output translated to 11 character
sequence
Now regarded as
inadequate
• Still often required for compatibility with
existing account management software
or multivendor environments
Password Cracking
Dictionary attacks Rainbow table
• Develop a large attacks
dictionary of possible • Pre-compute tables of
passwords and try hash values for all salts
each against the • A mammoth table of
password file hash values
• Each password must • Can be countered by
be hashed using each using a sufficiently
salt value and then large salt value and a
compared to stored sufficiently large hash
hash values length
Make
available
only to
Vulnerabilities
privileged
users
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Table 3.3
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Electronic Identity
Cards (eID)
Use of a smart card as a Most advanced deployment is
national identity card for the German card neuer
citizens Personalausweis
Can serve the same purposes as other Has human-readable data printed on its
national ID cards, and similar cards such surface
as a driver’s license, for access to • Personal data
government and commercial services • Document number
• Card access number (CAN)
• Machine readable zone (MRZ)