Knowledge Based Authentication (KBA) Metrics



Similar documents
Information Technology Branch Access Control Technical Standard

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Information Security Basic Concepts

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

A Framework for Secure and Verifiable Logging in Public Communication Networks

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

ARCHIVED PUBLICATION

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Entrust IdentityGuard

WHITE PAPER Usher Mobile Identity Platform

Digital Identity Management

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

NIST E-Authentication Guidance SP and Biometrics

Alternative authentication what does it really provide?

HIPAA Privacy & Security White Paper

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Identity & Privacy Protection

UF IT Risk Assessment Standard

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

Chapter 6: Fundamental Cloud Security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Introduction to Security

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Certification Practice Statement

Security Issues in Cloud Computing

CPSC 467: Cryptography and Computer Security

Security Goals Services

A Draft Framework for Designing Cryptographic Key Management Systems

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper

How To Ensure Correctness Of Data In The Cloud

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Neutralus Certification Practices Statement

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Multi-Factor Authentication of Online Transactions

Authentication Application

Authentication Tokens

Securing Cloud Applications with Two-Factor Authentication

Best Practices for Privileged User PIV Authentication

Chapter 1: Introduction

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Client Server Registration Protocol

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

Idaho Letter of Intent for 2015 MeF

Multi-factor authentication

Procedure Title: TennDent HIPAA Security Awareness and Training

CPSC 467b: Cryptography and Computer Security

A Method of Risk Assessment for Multi-Factor Authentication

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Cybersecurity Health Check At A Glance

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Welcome Guide for MP-1 Token for Microsoft Windows

Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners

Commercially Proven Trusted Computing Solutions RSA 2010

ViSolve Open Source Solutions

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Authentication and Authorization Applications in 4G Networks

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

A Security Survey of Strong Authentication Technologies

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

SECURING SELF-SERVICE PASSWORD RESET

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

Certification Practice Statement

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Electronic Authentication Guideline. -- OR --

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Threat Modeling. 1. Some Common Definition (RFC 2828)

BehavioSec participation in the DARPA AA Phase 2

Multi-Factor Authentication Core User Policy and Procedures

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

CipherShare Features and Benefits

Jim Bray, Cyber Security Adviser InfoSight, Inc.

NIST Cybersecurity White Paper

Security Levels for Web Authentication using Mobile Phones

Attestation and Authentication Protocols Using the TPM

Transcription:

Knowledge Based Authentication (KBA) Metrics Santosh Chokhani, Ph.D. February, 2004

Background Model for KBA Issues and Considerations Practical Usage of KBA Metrics for KBA Applicability to U.S. Government e- authentication Summary Briefing Contents 2

Background Context is U.S. Government e-authentication initiative as opposed to research or other applications of KBA Definition of KBA for this briefing, excludes Password and PIN (addressed separately in NIST e- authentication) Recognition oriented KBA (these systems require training the system during initial registration a luxury that may not be affordable at the lower levels of U.S. Government e-authentication initiative; Note: KBA seen to be more useful at lower levels of U.S. Government e-authentication initiative) 3

Background Definition of KBA for this briefing, includes Factoid recall (personal or otherwise, known to the subscriber, but not likely to be known to others, specially, potential masqueraders) Examples: Date of birth, Place of birth, Adjusted Gross Income, Taxes paid, Mother s maiden name, Cell phone number, Credit card number, Favorite team, Favorite team record Claimant, verifier, relying party terms used in this briefing in accordance with NIST e- authentication guideline 4

Purpose of KBA Used for initial registration per e-authentication guideline e-authentication guideline would like to include KBA as a means for transaction/session authentication: Useful for users who rarely authenticate to a system and do not like to register or do not like to manage passwords Determine how KBA can provide security commensurate with the requirements of the various e-authentication levels KBA will not be able to meet all the security requirements for higher levels o Level 3 unknown o Level 4 can not use KBA; it requires a hardware token 5

Model for KBA PIN: Claimant Credentialing or Challenger System.. KB 6

Considerations in Factoid Selection Impact on privacy Impact on identity theft Availability on other trusted systems for verification Example: Information on pay stub may great candidate for factoids, but is not likely to be available to verifier Guessability Reliability/Accuracy Ease of recall or access to the subscriber/claimant 7

Considerations in KBA Design KBA factoids can impinge on personal privacy KBA factoids can be used by unauthorized persons to conduct identity theft To protect against these, KBA implementation requires Strongly protected channel User workstation security a la other authentication mechanisms, except the potential damage due to compromise is bigger Server systems containing the factoids Servers could store one-way hash of factoids in order to minimize insider threat Distribute factoid databases across multiple servers 8

Considerations in KBA Design KBA design needs to determine how much information to provide in case of authentication failure User friendliness Vs providing information to imposter Security consideration may mean collect all the data and only provide pass/fail response Protected channel minimize off-line attacks except for insiders Response to authentication failures Subscriber notification Limited number of attempts Account lock out Auditing Exponential delays 9

Considerations in KBA Design Redundancy for availability and responsiveness Random selection of questions for each session to protect against script and manual threats Random ordering of questions for each session to protect against script Multiple forms of the same question to protect against script threats Providing claimant flexibility to select factoids to use depending on the subscriber s comfort level with verifier system Mix of static and dynamic factoids Static factoid example: date of birth Dynamic factoid example: bank balance Factoid aggregation impact on privacy Factoid aggregation impact on identity theft 10

Practical Usage of KBA Basic Requirement Strongly protected channel to protect against eavesdropping, replay, etc. to ensure individual privacy and protect against identity theft Initial registration by checking against existing databases KBA requires an on-line database or other mechanism to verify the factoids 11

Practical Usage of KBA Transaction authentication should use password or PIN established during initial registration, where initial registration is KBA based KBA is useful for transaction authentication for user with the following characteristics Uses a system rarely; or Does not like to register; or Does not want to manage PIN or password 12

Metrics for KBA KBA Metrics Guessability of factoid Guessability of KBA Cost of researching factoids User acceptance (psychological) Ease of use (ergonomics) Ease of administration Privacy protection Identity theft protection Commercial products Interoperability Cost of implementation 13

Guessability of Factoid Depends on the guesser Spouse/Significant Other/Cohabitant Immediate Family Extended Family Friend Acquaintance Employer Supervisor Employer HR Employer Coworker Accountant Attorney Others Depends on the factoid Date of birth, Place of birth, Credit card number, AGI, Tax, etc. See table for actual values 14

Guessability of KBA P KBA, j = π i p i, j Where: P KBA, j is probability of compromising KBA by j j is the claimant type i is the i th factoid p i, j is the probability of j to guess factoid I Assumption: Factoid are mutually independent, which may not be true for all factoids. 15

Applicability to U.S. Government e- authentication Initiative e-authentication Goal of reducing the service time from weeks to minutes KBA can be a useful initial registration tool If KBA is used for transaction authentication, the following must be addressed: Insider threat Aggregation of data Identity theft Privacy act Availability and response time concerns make validating KB from multiple sources impractical 16

Applicability to U.S. Government e- authentication Initiative Number of factoids used depend on the desired metric and assumptions regarding various types of claimants desire to masquerade Level 1 goal is 1 in 2048 ( 2-11 ) Level 2 goal is 1 in 65K (2-16 ) Level 3 goal is 1 in 1M (2-20 ) 17

Sample Metric Assume other as adversary Level 1 Always: Name, Address Random two of the following: Credit Card Number, Date of Birth, SSN, Credit Card Amount on Last statement (Probability = 2-24 ) Level 2 Always: Name, Address, Credit Card Number (2-24 ) Random two of the following: Credit Card Amount on Last statement, AGI, Tax, Bank Balance (Probability = 2-20 ) Level 3 -- TBD 18

Applicability to U.S. Government e- authentication Initiative Initial registration and credential renewal using KBA is acceptable at level 1 since level 1 has no requirements in these areas Initial registration and credential renewal using KBA is acceptable at level 2 since level 2 requires: verification of credit card number and home address Initial registration and credential renewal using KBA is acceptable at level 3 since level 3 requires: verification of credit card number and home address; and credit report KBA not recommended for Level 4 since it requires face to face authentication which provided opportunity to issue PKI or shared secret credentials 19

Applicability to U.S. Government e- authentication Initiative Transaction authentication using KBA in general is not recommended unless the subscriber prefers to KBA over credentials KBA can be used for transaction authentication for levels 1 and 2 Acceptability of KBA for transaction authentication at level 3 requires further discussions with NIST and e-authentication guideline authors 20

KBA metrics is an area of research KBA metric (i.e., probability of guessing a factoid) depend on the factoid Summary KBA metric for each factoid depend on the personality of the subscriber (introvert, extrovert, other factors in terms of network and size of personal and professional relationships) KBA metrics will require assumptions or special considerations for threats from persons known to subscriber 21

Summary KBA will require strongly protected channels (same as password and PIN, except in this case weak channel could lead to violation of privacy or identify theft) KBA will require strong assumptions regarding security of the user workstation (same as other authentication mechanisms, except in this case weak channel could lead to violation of privacy or identify theft) KBA can be deployed to protect against disclosure to verifier and relying party KBA more suited for initial registration 22

Questions