34
Authentication Authentication Lecture 4 Prof. S.M.Chaware 1

Authetication ppt

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Authetication ppt

AuthenticationAuthentication

Lecture 4Prof. S.M.Chaware

1

Page 2: Authetication ppt

Authentication• Authentication is the binding of an identity to a principal.

• Network-based authentication mechanisms require a principal to authenticate to a single system, either local or remote.

• External entity must provide information to enable the• External entity must provide information to enable the system to confirm its identity.

2

Page 3: Authetication ppt

Basics continueBasics continue…• Authentication process consists of obtaining the

information from an entity analyzing the datainformation from an entity, analyzing the data and determining if it is associated with that entity.

• Authentication system components are –Set A – authentication informationSet C – complementary informationSet F – complementation functionS t L th ti ti f tiSet L – authentication functionsSet S – selection functions

3

Page 4: Authetication ppt

passwordspasswords

• Is an example of an authenticationIs an example of an authentication mechanism based on what people know.

• User supplies the password, and computerUser supplies the password, and computer validates it.

• Password spacePassword space • Verification => one way hash function.

4

Page 5: Authetication ppt

Authentication system for password

• Set A – characters ( alphabets + digits + i l h t ) 8 h tspecial characters) - 8 characters.

• Set C – one way hash function to store password in a file (UNIX – 13characters)password in a file. (UNIX – 13characters) /etc/passwd.

• Set F – based on permutation of the DES, p ,contains 4096. – login, su.

• Set L – system supply proper element of C.• Set S – passwd, nispasswd.

5

Page 6: Authetication ppt

Protecting passwordsProtecting passwords

• Hide enough information so that one of aHide enough information so that one of a, c or f cannot be found.

• Prevent access to the authentication• Prevent access to the authentication functions L.

6

Page 7: Authetication ppt

Attacking password systemAttacking password system

• Dictionary attackf(g) for each f F.(g)F(g) => complementary information for entity E, then g authenticates E under fentity E, then g authenticates E under f => type 1.l=> L if g => l results true g is correctl=> L, if g => l results true, g is correct password. => type 2.

7

Page 8: Authetication ppt

Countering password guessingCountering password guessing

• P >= TG/NP >= TG/N.Where P – probability of guessing the

passwordpassword.T – no. of time unitsG – no. of guesses/ unit time.N – no. of possible passwords.p p

8

Page 9: Authetication ppt

User Authentication• In-person identification• Must be based on some knowledge shared only by the

computing system and the usercomputing system and the user• Three qualities to confirm user’s identity

1. something the user knows1. something the user knows

2. something the user has

3. something the user is (biometrics)

4. Where the entity is (In front of)Two or more forms can be combined

9

Two or more forms can be combined

Page 10: Authetication ppt

Use of Passwords• Password – a ‘word ‘ known to computer and

user; agreed upon codeword; length and format varies.varies.

• Humans:– Short, memorable key (8 characters, 48 bits), directly

or as key for longer keyor as key for longer key• Computers:

– (Long) high-quality secret( g) g q y– Hidden key (encrypted by password), directly (e.g.,

hash of the password)

• Key versus passwords.• Additional Authentication Information

10

Page 11: Authetication ppt

Attacks on Passwords….1. Try all possible passwords

2. Try many probable passwords3. Try passwords likely for the user4 S h f h li f d4. Search for the system list of password5. Ask the user

1. Exhaustive AttackBrute force attack5 * 10^12 passwords for 26 alphabets2. Probable PasswordsThink of a wordThink of a wordLength 3 – 18.278 sec.Length 4 – 8 min.Length 5 – 3.5 hoursDictionary

3. Attacking systems via passwords.Outsider normal user administrator.

11

Page 12: Authetication ppt

Passwords Likely for a userPasswords Likely for a user

• Password15 0.5% Were a single

ASCII chara.Password something meaningful

72 2% Were two single ASCII chara.

464 14% Were three ASCII chara.ASCII chara.

477 14% Were four alphabetic letters

W fi706 21% Were five same case alphabets

605 18% Were six lowercaselowercase alphabets

492 15% Words in dictionaries or list

12

of names

2831 86% Total of all above categories

Page 13: Authetication ppt

Passwords Likely for a user

13

Page 14: Authetication ppt

Password guessing steps– On-line: limit tries, alarm– Off-line: dictionary attack

• No passwordp• The same as the user ID• is, or is derived from the user’s name• Common word list plus common names and patterns• Short college dictionary• Common non-English language dictionaries• Short dictionary with capitalizations and substitutions (PaSsWorD)

C l t E li h ith it li ti d b tit ti• Complete English with capitalizations and substitutions • Common non-English with capitalizations and substitutions• Brute force, lowercase alphabets• Brute force full character set• Brute force, full character set

14

Page 15: Authetication ppt

Protecting password list file• Problems:• OS is not divided, so all its modules have access to all ,

privileged information

• An intruder can dump a memory at a convenient time to access it

• File system can be relocated from a backup

• Password file is a copy of a file stored on a disk

15

Page 16: Authetication ppt

Encrypted Password File• Password list is hidden by conventional encryption or

one way ciphers

• One-way encryption

• salt – E(pw+saltB) & saltB is stored

• Indiscreet Users : -- writing down or telling the password

16

Page 17: Authetication ppt

Password Selection Criteria• Use characters other than just A-Z – 6 letter word one case – 100

hours, upper and lower – 2 years

• Choose long passwords

A id t l d• Avoid actual names or words

• Choose an unlikely password -- 2Brn2B or I10veu •• Change the password regularly

• Don’t write it down

• Don’t tell anyone else

17

Page 18: Authetication ppt

Password Selection Criteria…..• Some systems provide meaningful but

pronounceable passwords (“bliptab” as “blaptib” (or “blabtip”)

• Some systems ask user to change the password• Why reminder process is not good?

• Group A: 6 characters with at least one non-letter. 30% are easy to crack.

• Group B: based on passpharses. 10%.• Group C: 8 randomly selected characters. 10%.

18

p y

Page 19: Authetication ppt

One-Time Password• --is one that changes every time it is used

S t i t ti th ti l f ti• System assigns a static mathematical function

• Also called as challenge-response systems• Also called as challenge-response systems

• f(x) = x + 1( )• f(x) = r(x)• f(a1a2a3a4a5a6) = a3a1a1a4• f(E(x)) = E(D(E(x) + 1).

19

Page 20: Authetication ppt

Password verificationPassword verification

• Store password in a fileStore password in a file.• Store hashed passwords in a file.

St i d• Storing passwords– Per-node: /etc/passwd– Server: authentication storage server,

retrieved by node (yp/NIS)– Facilitator: server says yes/no

• salt – E(pw+saltB) & saltB is stored.

20

Page 21: Authetication ppt

Password crackingPassword cracking

• 128 choices128 choices.• 8 characters => 1288 = 256 possible

passwordspasswords.• 4 cases of success of password crackes:

– Without using dictionary of likely passwords.– Using dictionary.– Without using dictionary from hashed file.– Using dictionary.

21

Page 22: Authetication ppt

Other password issuesOther password issues

• Reuse of passwordReuse of password.• Social engineering

K t k l i ft• Keystroke logging software, spy-ware.• Password cracking tools.

• Solution: use of biometricsSolution: use of biometrics.

22

Page 23: Authetication ppt

Fixing flaws in the Authentication Process

• Challenge-Response systems

• Impersonation of Login

• Authentication other than Passwords –Authentication other than Passwords handprint detectors, voice recognizers, identifiers of patterns in the retinaidentifiers of patterns in the retina

23

Page 24: Authetication ppt

biometricsbiometrics• Efforts to find physical characteristics

that uniquely identify people include the Bertillion cranial maps, fingerprints and DNA liDNA sampling.

• Biometrics is the automated t f bi l i lmeasurement of biological or

behavioral features that identify a personperson.

• Common features are fingerprints, voices face and keystroke dynamics

24

voices, face and keystroke dynamics.

Page 25: Authetication ppt

User selection of passwordsUser selection of passwords• Proactive password selectionp• Passwords based on account names

Account name followed by a numberA t d d b d li itAccount name surrounded by delimiters

• Passwords based on user namesInitials repeated 0 or more timesInitials repeated 0 or more timesAll letters lower-or-uppercaseName reservedFirst initial followed by last name reversed.

25

Page 26: Authetication ppt

Continue…• Passwords based on computer names• Dictionary words• Reversed dictionary words• Dictionary words with some or all letters

capitalized.• Patterns form keyboard.• Only digits• Acronyms• Dictionary words with all vowels deleted.

26

Page 27: Authetication ppt

Guessing through authentication functions

• Solution: Backoff techniques.Expontial backoffDisconnectionDisablingjailing

27

Page 28: Authetication ppt

Backoff techniquesBackoff techniques

• X- parameter selected by system administrator.

• Waits for x0=1 sec before reprompting for name and authentication data.If t f il i it f 1• If system fails, again waits for x1=x sec.

• After n failures, waits for xn-1 sec.

28

Page 29: Authetication ppt

Other techniquesOther techniques• Disconnection – after some number of failed

th ti ti tt t th ti iauthentication attempts, the connection is broken.Di bli th t i di bl d til• Disabling – the account is disabled until a security manager can reenable it.

• Jailing the unauthenticated user is given• Jailing – the unauthenticated user is given access to a limited part of the system and is gulled into believing that he/she has fullgulled into believing that he/she has full access. The jail records the attacker’s actions.

29

Page 30: Authetication ppt

Summary• Memory protection : -- fence, base-bound

register, tagged architecture, paging, segmentationsegmentation

• file protection : three or four level format• file protection : -- three or four level format, user-group-all

• access control in general : -- access control matrix, per-object or per-user basis

• user authentication :-- password protection

30

Page 31: Authetication ppt

Qu. On OS Security1. Explain different methods for memory and

address protection (183)p ( )2. Compare Segmentation with Paging (193)3. Explain different methods to be used to protect3. Explain different methods to be used to protect

objects (196)4. Explain various schemes for file protection (205)p p ( )5. Explain ways to determine a user’s password

(212)(212)

31

Page 32: Authetication ppt

Qu. On OS Security6. Explain how a fence register is used for

relocating a user's program [MAY-05/IT/5M]relocating a user s program.[MAY 05/IT/5M]7. Explain why asynchronous I/o activity is . a

problem with many memory Protectionproblem with many memory Protection schemes, including base/bounds and paging. Suggest solution to the problem. [MAY-05/IT/7M]

8. Discuss several guidelines for password8. Discuss several guidelines for passwordselection (218)

32

Page 33: Authetication ppt

Qu. On OS Security9. Authentication means proving identities between entities

which happens in different layers of network protocol stack for different reasons Identify these entities andstack for different reasons. Identify these entities and state them.

10. How does OS protect files in main memory and on secondary device.

11.Discuss any two techniques of memory and address protection.

12.Explain the use of temporal separation and physical separation for security in computing environment.

33

Page 34: Authetication ppt

Qu. On OS Security13. (a) Why the user authentication is required?

(b) What techniques are used for the authentication?( ) f(c) What are the flows in the user authentication

process?(d) Suggest controls over them.( ) gg

14. Consider a program to accept and tabulate votes in an elector who might want to attack the program? whatelector. who might want to attack the program? what types of harm might they want to cause? what kinds of vulnerabilities might they exploit to cause harm?

34