Secure Remote Password (SRP) Authentication



Similar documents
Client Server Registration Protocol

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 16: Authentication in Distributed System

Alternative: Strong password Protocols

Capture Resilient ElGamal Signature Protocols

Cryptography and Network Security

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Three attacks in SSL protocol and their solutions

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Authentication Protocols

Midterm. Name: Andrew user id:

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

CSCE 465 Computer & Network Security

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

My FreeScan Vulnerabilities Report

SENSE Security overview 2014

BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

On the Limits of Anonymous Password Authentication

Authentication in WLAN

Steve Gibson Revolutionizing Website Login and Authentication with SQRL SQRL

How To Use Kerberos

Dashlane Security Whitepaper

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Chapter 8. Network Security

Cryptography and Network Security: Summary

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Using Foundstone CookieDigger to Analyze Web Session Management

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security Technology Network Management

Apache Milagro (incubating) An Introduction ApacheCon North America

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

PASSWORD MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Security in Android apps

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Reparing HTTP authentication for Web security

Chapter 7: Network security

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CRYPTOGRAPHY AS A SERVICE

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Server-Assisted Generation of a Strong Secret from a Password

Password Manager with 3-Step Authentication System

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

SSL/TLS: The Ugly Truth

Bit Chat: A Peer-to-Peer Instant Messenger

What is network security?

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

SFWR ENG 4C03 - Computer Networks & Computer Security

TFS ApplicationControl White Paper

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

CS 494/594 Computer and Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Authentication requirement Authentication function MAC Hash function Security of

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

RemotelyAnywhere Getting Started Guide

CS 758: Cryptography / Network Security

Installation and usage of SSL certificates: Your guide to getting it right

Cryptography and Network Security Digital Signature

TELE 301 Network Management. Lecture 16: Remote Terminal Services

ARCHIVED PUBLICATION

CRYPTOGRAPHY IN NETWORK SECURITY

How To Encrypt Data With Encryption

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Efficient Nonce-based Authentication Scheme for. session initiation protocol

EXAM questions for the course TTM Information Security May Part 1

Copyright: WhosOnLocation Limited

Is Your SSL Website and Mobile App Really Secure?

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Research Article. Research of network payment system based on multi-factor authentication

Transcription:

Secure Remote Password (SRP) Authentication Tom Wu Stanford University tjw@cs.stanford.edu

Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart cards What you know Passwords, PINs 2

Password Authentication Concentrates on what you know No long-term client-side storage Advantages Convenience and portability Low cost Disadvantages People pick bad passwords Most password methods are weak 3

Problems and Issues Dictionary attacks Plaintext-equivalence Forward secrecy 4

Dictionary Attacks An off-line, brute force guessing attack conducted by an attacker on the network Attacker usually has a dictionary of commonly-used passwords to try People pick easily remembered passwords Easy-to-remember is also easy-to-guess Can be either passive or active 5

Passwords in the Real World Entropy is less than most people think Dictionary words, e.g. pudding, plan9 Entropy: 20 bits or less Word pairs or phrases, e.g. hate2die Represents average password quality Entropy: around 30 bits Random printable text, e.g. ndz2\u>o Entropy: slightly over 50 bits 6

Plaintext-equivalence Any piece of data that can be used in place of the actual password is plaintextequivalent Applies to: Password databases and files Authentication servers (Kerberos KDC) One compromise brings entire system down 7

Forward Secrecy Prevents one compromise from causing further damage Compromising Current password Old password Current password Current session key Should Not Compromise Future passwords Current password Current or past session keys Current password 8

In The Beginning... Plaintext passwords e.g. unauthenticated Telnet, rlogin, ftp Still most common method in use Encoded passwords e.g. HTTP Basic authentication Using password to encrypt verifiable text e.g. Kerberos vulnerable to dictionary attack 9

More Weak Authentication Challenge-Response authentication e.g. S/Key, OPIE, CRAM User receives C, responds with f(c, P) Susceptible to passive dictionary attack Public-Key-Assisted Login e.g. stel, SRA Telnet Uses plain Diffie-Hellman or ephemeral RSA Susceptible to active attacks 10

Augmenting Weak Methods Iterated hashing Increases amount of time required for attack Also slows down legitimate authentication Maximum improvement is less than 10 bits Computer-generated passwords Have higher entropy Easy to forget, and are more likely to be written down (a security problem in itself) 11

The Empire Strikes Back 20-25 bits can be attacked easily today Even one successful password guess (weakest link in chain) lets an intruder in Attacks are easily parallelizable Moore s law constantly erodes security of weak methods Lose 2 bits of strength every three years 12

Better Weapons EKE Bellovin & Merritt: 1992 Secret public-key Gong, Lomas, Needham, Saltzer: 1993 SPEKE Jablon: 1996 OKE Lucks: 1997 13

Advantages of Strong Methods Attacker must solve at least one hard public-key problem first Key exchange after successful login Some also offer: Resistance to active attacks Forward secrecy But these are still plaintext-equivalent... 14

Return of the Jedi A-EKE Bellovin & Merritt: 1994 B-SPEKE Jablon: 1997 SRP Wu: 1997 All are verifier-based 15

History of SRP Originally designed to handle authentication between Java applet and Java-based server at Stanford Widespread applicability and interest led to development of software suite Discussions on sci.crypt led to final version, sometimes called SRP-3 16

The SRP Protocol Carol (the client) m = large safe prime (2q+1, q prime) g = primitive root mod m P = plaintext password Carol knows the password, x = H(P) Steve knows the verifier, v = g x (mod m) Generates random a A = g a (mod m) K = (B - g x ) a+ux (mod m) Steve (the server) Each side then proves it knows K Generates random b, u B = v + g b (mod m), u K = (Av u ) b (mod m) 17

Security Analysis g must be primitive root to avoid leaking information about v Carol must be first to issue proof of K u must not be revealed before A Random numbers a, b must be discarded when protocol finishes Check for invalid inputs, e.g. A, B == 0 18

Protocol Families A- and B- protocols sometimes called extended methods Two key-exchange rounds A-EKE: extra digital signature B-SPEKE: extra El Gamal key exchange SRP is part of a third family (AKE) Password and verifier are integrated into a single key-exchange round 19

How They Stack Up Cleartext Password Challenge- Response Strong Password (SPEKE) Verifierbased (SRP) Does not reveal password No Yes Yes Yes Resists dictionary attack No No Yes Yes Not plaintextequivalent Yes No No Yes Provides forward secrecy No No Yes Yes 20

Some Scary Trends Inexpensive PCs can exceed 10K crypts/sec No Moore s Law for human memory Increased size of Internet means more access to free CPU cycles Even forcing good password choices only delays inevitable Bad guys have caught up and taken the lead (CERT Advisory 94:01)... 21

Strong vs. Weak Methods Effort needed to crack an average password Cost of attack (PC * hours) 1E+12 SRP 1E+9 Iterated Hash 1E+6 C-R 1E+3 (safe) 1E+0 1E-3 1995 2000 2005 2010 2015 2020 2025 22

Impact of Strong Authentication Best known algorithms for compromising SRP (discrete log) not easily parallelizable Places off-line attack against even short passwords out of reach Infinitely stronger than weak methods Designed as drop-in replacements Low cost and socially acceptable 23

Applications Remote login/access (Telnet, FTP) E-mail (POP, IMAP) World Wide Web Firewalls Network computers Any situation where an actual person needs to be authenticated 24

The SRP Project Freeware API library in both C and Java Telnet and FTP for Unix and Windows Distributed architecture being developed Public collaboration w/internet community Drafts submitted to IETF, IEEE P1363 Help always appreciated Join the mailing list 25

Looking Ahead Increase awareness of broken systems Kerberos V4, V5, Windows NT, S/Key,... Fix these systems where possible Jaspan, 1996 describes Kerberos fix Strong authentication mechanisms have become Best Current Practice No excuse to use broken methods anymore Good guys are winning again... 26

For More Information SRP Web Site http://srp.stanford.edu/srp/ Contains links to download source code and information about mailing list E-mail tjw@cs.stanford.edu 27