Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques



Similar documents
Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Authentication Protocols

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Client Server Registration Protocol

How To Make A Trustless Certificate Authority Secure

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

A Security Survey of Strong Authentication Technologies

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Secure Remote Password (SRP) Authentication

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

ARCHIVED PUBLICATION

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

TELE 301 Network Management. Lecture 18: Network Security

Digital Signatures on iqmis User Access Request Form

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Module 7 Security CS655! 7-1!

White Paper: Multi-Factor Authentication Platform

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Authentication Applications

CSCE 465 Computer & Network Security

Multi-factor authentication

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Authentication Application

Cryptography and Network Security

Security: Focus of Control. Authentication

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Computer and Network Security. Outline

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

Kerberos. Login via Password. Keys in Kerberos

Network Security - ISA 656 Security

Introduction to Computer Security

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Research Article. Research of network payment system based on multi-factor authentication

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

How To Use Kerberos

RemotelyAnywhere. Security Considerations

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Using etoken for SSL Web Authentication. SSL V3.0 Overview

The Case For Secure

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Public Key Infrastructure (PKI)

1.2 Using the GPG Gen key Command

Network Security: Public Key Infrastructure

Two-Factor Authentication Making Sense of all the Options

CSE/EE 461 Lecture 23

HP ProtectTools Windows Mobile

Chapter 7: Network security

Content Teaching Academy at James Madison University

CS 392/681 - Computer Security

What Are Certificates?

Information Security

INTRODUCTION TO CRYPTOGRAPHY

CS 356 Lecture 28 Internet Authentication. Spring 2013

Alternative: Strong password Protocols

SBClient SSL. Ehab AbuShmais

Secure Data Exchange Solution

NETWORK SECURITY: How do servers store passwords?

Cornerstones of Security

Two Factor Zero Knowledge Proof Authentication System

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Authentication Tokens

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Network Security. HIT Shimrit Tzur-David

Entrust Managed Services PKI

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Introduction to Network Security Key Management and Distribution

Sync Security and Privacy Brief

Chapter 16: Authentication in Distributed System

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Hard vs. Soft Tokens Making the Right Choice for Security

An Introduction to Cryptography and Digital Signatures

PASSWORD MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Security Digital Certificate Manager

ISM/ISC Middleware Module

Lecture VII : Public Key Infrastructure (PKI)

Authentication Applications

Den Gode Webservice - Security Analysis

Cryptography and Network Security Chapter 14

An Overview of the Secure Shell (SSH)

Transcription:

Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information) 1 2 of People how authentication is done depends on capabilities of entity being authenticated two most important capabilities ability to store a high-quality key ability to perform cryptographic operations High Quality Key secret chosen from large space computationally infeasible to guess 3 4

Computer vs. Person computer has both person has neither Passwords an old idea military uses everybody knows password of day 5 6 Password Based Problems with Passwords in password based authentication we have a secret quantity you have to state it to prove you know it has a number of problems eavesdropping on-line guessing of password off-line cracking unguessable passwords unusable security of password file 7 8

Eavesdropping passwords must be uttered to be used can then be overheard most people don't watch but they are not the people you are worried about wiretapping is a more sophisticated problem Eavesdropping if the password is sent from across a network then eavesdropping is possible for example, a traditional telnet connection is unsecured no cryptography so an attacker who can eavesdrop, eg., on the port in use, simply gets to see the password 9 10 Trojan Horses A trojan horse is a useful, or apparently useful, program, which also performs unwanted/harmful functions If a user can be induced to run a trojan horse which mimics the log in program then the trojan can capture the user s password The password can then be sent to the author of the trojan On-Line Guessing I can impersonate you if I can guess your password some systems enforce easily guessable passwords (not really a good idea, but some do it would be better to disallow) some people use easily guessable passwords 11 12

On-Line Guessing with enough guesses even obscure passwords can be guessed not a problem for the military get it wrong, get shot On-Line Guessing executing users who get their password wrong would probably be unacceptable can make sure that guesses have to be typed 13 14 Locking Accounts can lock accounts after too many failed attempts but then easy for someone to deny access can cut-off connection after a number of failed attempts and require it to be reestablished can have system response be very slow Catching Attacker can attempt to catch guesser trace modem connection or otherwise locate especially when attempts are made to different accounts 15 16

Off Line Password Guessing How Big? passwords more vulnerable if off-line guessing possible off line attack - an intruder captures a quantity that is derived from password attacker then takes their time trying to compute password if off-line guessing is possible then password must be from a much larger to thwart on line attacks only, secret does not have to be from large space for off-line attacks, secret needs 80+, maybe 128+, bits of randomness 17 18 space then if it is not Problem humans usually are not willing to remember 64 bits a randomly chosen 11 character string will suffice for 64 bits but humans won't remember those either Memorable Passwords if the password was pronounceable, rather then fully random can get enough randomness in 16 characters humans won't remember those either 19 20

User Chosen humans choose poor passwords to be proof against off-line attacks passwords need to be ~32 characters long humans certainly won't remember those Conclusion passwords will be vulnerable to off-line guessing 21 22 Passwords system can assign random ones - users resent systems can check for easily guessed ones Alternatives one-time passwords but then occasionally need new list a set of passwords use only some at each login, on a challenge-response basis eavesdropper has to listen many times 23 24

Password Files Protecting Passwords if password file disclosed all passwords vulnerable attacker usually wants any password, not a particular one can use dictionary to attempt to crack some passwords password files must be at least as well protected as anything else 25 some system do not store the passwords themselves instead hold quantity derived from password, such as cryptographic hash 26 Salt Salt system chooses random number for each user - the salt stores salt and hash of combination of salt and password salt does not make it harder to guess password does it make it harder to use single guess on all passwords 27 User ID salt value password hash Mary 2758 hash(2758 passwd) John 886d hash(886d passwd) Ed 5182 hash(5182 passwd) Jane 1763 hash(1763 passwd) 28

Other Problems with Passwords users will give passwords to others will write them down put them in programs will forget them Multiple Uses users may have multiple accounts may use same passwords for all easier to remember break one, break into all 29 30 Password Changes Problems system can require regular password changes if attacker knows password, only until next change too frequent changes lead to poorly chosen passwords users will write them down users will oscillate between two passwords 31 32

Password Distribution how are passwords given to users in the first place? if you can impersonate user to system administrator may get their password In Person turn up to administrator's terminal authenticate using documents type in password inconvenient gives access to sensitive terminal 33 34 Administrator Chosen administrator chooses good password gives it to user instructs them to change it immediately Pre-Expired as before, but password already expired must be changed immediately can be written down for distribution 35 36

Variations distribute passwords by mail original password function of user attribute (eg.., ID#) Passwords in Distributed Systems how do you access resources on different workstations? does your workstation remember your password and transmit it? but then you need same password on every workstation how do keep them co-ordinated? 37 38 Storing User Passwords how does a server know Alice's password? Alice's authentication information is individually configured into every server one location stores Alice's information and servers retrieve it when needed Storing User Passwords (cont.) one location stores Alice's information and servers which want to authenticate Alice send Alice's information to the location which replies yes or no for the last two the server must be certain of the identity of the node which stores the authentication information 39 40

Database such a database must be secure can encrypt passwords or hashes of the passwords if the key for that node is broken, the whole database will be vulnerable Password Based vs. Cryptographic some systems might be thought password based but are not if secret string is converted into a cryptographic key, it is not really password based 41 42 Why Use Passwords? Example given that cryptographic authentication is more secure, why use password based authentication at all? having dumb terminals using a protocol designed without cryptography perhaps protocol would be too expensive if cryptography used 43 early cellular phones transmitted the telephone number of the phone and a password when making a call if the password corresponds to the telephone number, call is allowed very easy to eavesdrop and clone phone a challenge response protocol would have been better 44

Address-Based Implementation does not rely on sending passwords assumes identity of source can be determined from network address at which packets originate each node notes which accounts on other nodes should have access to its resources node B holds a list of network addresses of equivalent machine if node A is listed, then any account on A is equivalent to the same account name on B or 45 46 Implementation (cont.) node B might instead have a list address, remote account name, local account name request from remote account on remote machine is equivalent to same request coming from local account Security Considerations if someone subverts a node, can access resources on other machines open to accounts on the subverted node of course, attacker needs to know what possibilities exist 47 48

Security Considerations (cont.) Tokens however, access is usually complementary, so only needs to examine database on subverted node if attacker may be able to forge messages so that they appear to be from other nodes attacker can then access resources reserved for users from those nodes 49 what you have subject to theft generally used either with passwords or biometric checks 50 keys (car, house) credit cards Examples hold information Magnetic Strips not trivial to counterfeit people less likely to loan then share password 51 52

Disadvantages requires custom hardware can be lost, stolen, damaged or destroyed require override when card misplaced as vulnerable as password to eavesdropping Smart Card same size as credit card embedded CPU and memory insert in smart card reader reader and card carry on conversation with magnetic strip simply dump information 53 54 PIN Protected Memory Card information in memory of card only read after PIN input card locks after some number of wrong guesses more secure then magnetic strip Cryptographic Challenge/Response Card cryptographic key held in card memory card will encrypt or decrypt using key will not reveal key, even after PIN entered 55 56

Challenge/Response computer that knows key can authenticate picks random challenges card to encrypt or decrypt cards unreadable for most practical purposes offer protection against eavesdropping Problems need special devices cards can be lost or stolen 57 58 Cryptographic Calculator Physical Access also called readerless smart card performs cryptographic calculations uses a key it will not disclose needs no reader has a display and keyboard all interaction through user popular for remote access to networks 59 provide authentication via human guards system authentication distinguishes legitimate users eg., bank tellers location can be part of authentication process rights granted depend on location 60

Biometrics what you are measure physical characteristics hard to loan or steal Examples retinal scanner fingerprint scanner handprint reader voiceprints keystroke timing signatures 61 62 Problems Cryptographic Protocols hard to keep biometric quantities secret reader needs tamper-resistant secret communicates with remote computer via cryptographically protected exchange 63 can be much more secure than password or address based authentication Alice proves her identity to Bob by performing a cryptographic operation on a quantity Bob supplies the cryptographic operation is based on Alice's secret 64

Who is Being Authenticated? a user, eg., when wanting to access the files at a server a node, eg., duplicate file servers authenticating each other a user and a node, eg., a bank teller at their assigned terminal The Difference a computer can store a high quality secret and do cryptographic operations a computer can do these on behalf of a user but system has to be designed so that all user has to remember is password 65 66 Password to Key Passwords as Cryptographic Keys do a hash of password use password to decrypt higher quality key, such as RSA private key public key cryptographic keys are specially chosen very large numbers most users can not remember something like this can remember a password can convert password into DES key much harder to convert it into RSA key 67 68

Possible Solution use password as seed for pseudorandom number generator remember RSA keys need to generate lots of numbers to test for primality this method can take a long time but can also get user to remember how many numbers generated to get each key in pair In Practice not done all that often because of time taken and knowledge of public key allows off-line password guessing usual practice is to encrypt user's private key with user's password and store it somewhere it can be recovered by workstation and decrypted using password 69 70 Protocol Attacks Alice -> Bob : I'm Alice Bob -> Alice : random R Alice -> Bob : R signed with Alice's private key Bob checks using Alice's public key 71 public key technology makes it easy to do authentication secure from both eavesdropping and server database reading eavesdropping useless accessing Bob's database only gives Alice's public key, which everybody knows anyway 72

Without Public Key - Eavesdropping Without Public Key - Server Compromise If protocol is Alice-> Bob : Alice's password Bob is machine authenticating Alice eavesdropper can get password Bob's database is hashed version of password - useless to intruder as they can not get password If protocol is Alice-> Bob : I'm Alice Bob -> Alice : Random R Alice -> Bob : X X is cryptographic function of Alice's secret and R, for example [R] K AB 73 74 Attacks eavesdropper learns nothing but Bob must store Alice's secret to check X so intruder gets Alice's secret Getting a Key if A wants to communicate with B, needs B's public key when B is added to system could tell everyone B s key not very practical in large systems 75 76

Trusted Intermediaries can have one system which stores everyone's public key when want to talk to another principal, go to the system with all the keys need to be aware of root of trust KDC one version of this idea is a Key Distribution Centre KDC knows keys for all nodes, users etc (ie all principals) when new principal installed, only it and KDC need to have key 77 78 Conversations using KDC Conversations using KDC if node a wants to talk to node b, a talks to KDC this is secure as a and KDC share a secret key a asks KDC for key to talk with b KDC authenticates a 79 chooses random Rab for use as key between a and b encrypts Rab with key shared between a and KDC encrypts Rab with key shared between b and KDC sends both to a a sends encrypted Rab to b 80

Tickets usually with information such as expiry time and a's name this is usually called a ticket Disadvantages of KDC KDC can impersonate anyone KDC is a single point of failure KDC can be a performance bottleneck 81 82 Possible Problem key distribution easier with public keys but how do you know the listed public key is the correct one for the listed entity? what if some attacker has substituted their public key? Certification Authorities generate certificates signed messages which specify a name (eg., Alice) and the corresponding public key all nodes need to know CA's public key can then verify signatures 83 84

Certificates certificates can be stored anywhere a principal can provide its certificate as part of authentication if the CA is compromised it can destroy the integrity of the entire network have Certificates user's name user's public key expiration time serial number issuing CA's signature 85 86 Advantages of CAs over KDCs CA does not need to be on-line as not on line can be simpler and more secure if CA crashes only stops new users being added certificates themselves not security sensitive Advantages of CAs over KDCs a compromised CA cannot decrypt conversations a compromised CA can still impersonate a network entity 87 88

Certificate Revocation Certificate Revocation List what if Fred is a given a certificate with a life span is a year and is soon after fired? with KDC's, simply delete him from the KDC must somehow cancel certificate can publish lists of revoked certificates (a la credit cards) 89 A CRL lists serial numbers of certificates that should not be honoured a certificate is valid if it has a valid CA signature has not expired is not listed in the most recent CRL CRL has an issue time an intruder could destroy CRL 90 Lifespans & Revocation Lifespans certificate lifetimes can not be too short or certificates have to be issued too often can not be too long, or will have to revoke too many certificates 91 note the tradeoff between certificate lifespan and CRL length could include extra field in CRL which gives first valid certificate all earlier certificates invalid requires serial numbers to be issued in order then do not need lifetimes for certificates 92

Multiple Trusted Intermediaries Domains problem with a KDC or CA is that there must be only one trusted authority as the system is scaled we reach the point where no one entity is trusted by everyone solution is to split world into domains each domain has one trusted authority if Alice and Bob are in same domain, they authenticate as already described if they are not, they still can authenticate, but it is more complicated 93 94 Communication across Domains Communication across Domains say Alice is domain a Bob is in domain b the KDC's of a and b share a key, Kab Kab is used when a user in a wants to have a secure communication with a user in b 95 Alice tells her KDC she wants to talk to b's KDC a's KDC treats this much the same as a communication between two users in its domain a's KDC generates a key, Knew encrypts this using Alice's key and Kab message also contains Alice's name 96

Communication across Domains Communication across Domains Alice sends all this to the KDC of b, along with Bob's name and a's name KDC of b knows which key to use (from a's name) KDC of b generates key and message for Alice to communicate with Bob and sends it to Alice as if Alice was part of b's domain Alice Let me talk to b s KDC KAlice {use Knew} Kab{Alice from my domain wants to talk to you, use Knew} Knew {use KAlice-Bob} A s KDC a s KDC generates Knew Let me talk to Bob KBob{talk to Alice from a, using KAlice-Bob} B s KDC b s KDC generates KAlice-Bob Bob Alice can then communicate with Bob 97 98 Many Domains there are many domains on the internet too many for all the KDC's to have keys for each other Chain of KDC's users can securely talk to each even if their KDC's are not directly linked ie, do not have each other's keys need a chain of KDC's to be found when the chain is found Bob and/or the KDC in his domain should be informed of it when they are contacted 99 100

How to find Chain? perhaps a hierarchy some pairs of KDC's are linked across branches 101 Problems After if only do authentication eavesdropper might overhear authentication the messages might be intercepted in transmit and modified or replayed someone on path might hijack entire session by impersonating network address of one party cryptography can protect against these 102 Which Key? Long Term Key could use public keys computationally expensive parties need secret key nice if authentication involved agreement on secret key 103 could have a long term key keys wear out - the longer use, the more chance of being cracked old conversations could then be decrypted re-used keys allow more chances for replay can not give less trusted software the key 104

Session Key the problems with long term keys solved by a session key used for one conversation only usually established during authentication 105