Identity Authentication: Dr. Ron Rymon Efi Arazi School of Computer Science Computer Security Course, 2010/11
Identity Authentication: Dr. Ron Rymon Efi Arazi School of Computer Science Computer Security Course, 2010/11
Dr. Ron Rymon Efi Arazi School of Computer Science Computer Security Course, 2010/11
Overview
Identity Authentication Principles
Passwords
Challenge-Response
Main Objectives
If Alice and Bob are both honest, then Alice
should be able to successfully authenticate herself to Bob, and vice versa (correctness)
Charles cannot present himself as Alice to Bob
(impersonation)
Bob cannot utilize an identification exchange with
Stronger Requirements
We require also that all three requirements (correctness,
Others
Someplace you are (e.g. GPS location) Some way you behave
Ideally, more than one factor (Two-factor authentication) In some applications real-time identification is required
Passwords
(weak authentication)
Passwords
String of 6-8 characters that allows identification Fixed password/PINs, one-time passwords something you know Properties No reciprocity only unilateral identification Low complexity very efficient, both computationally and communication-wise Usually, no third party is used (exception: SSO) Key is usually kept by user in memory, and by system in a password file
Exhaustive search
Randomly or systematically trying passwords against online verifier Offline search against password file enough that one user chose a weak password
Password Space
Entropy
n 5 6 7 26 lowcase 23.5 28.2 32.9 36 alphanum 25.9 31.0 36.2 62 95 mixed case keyboard 29.8 35.7 41.7 32.9 39.4 46.0
(log 2)
8
n 5 6 7 8
37.6
26 lowcase 0.67hr 17hr 19dy 1.3yr
41.4
36 alphanum 3.4hr 120hr 180dy 18yr
47.6
52.6
Time
62 95 mixed case keyboard 51hr 130dy 22yr 1400yr 430hr 4.7yr 440yr 42000yr
To Search
(5000/sec)
h(Alice,pwd)
Salting
Goal: limit use of simultaneous dictionary attack Add a few bits to the password before hashing Usually, a time stamp or something based on the user id
Unix takes timestamp-based salt, Novells Netware takes serverassigned user ID
0000
modified DES
ciphertext
known and the plaintext is known DES is repeated 25 times, to slow down breaker Password is salted
12 randomly chosen bits from system clock are used to salt the password. They are used in the DES expansion function Thus, 212=4096 variations need checked in any simultaneous dictionary attack Because of the internal change to DES, one cannot use off-the-shelf DES hardware
0.1 0.6
3.8 7
4.5 3
Only 4% used at least one non-alphanumeric character 86% did not require using the shift key Some accounts used dates, telephone numbers Some passwords were common to more than one account 24% were combinations of two words 25% resulted from simple transformations of single words, e.g., capitalizing, reversing, or doubling of a word
Lowercasing a word was the most common transformation 1 was the most common suffix/prefix
Solution:
Centralized enterprise system Synchronize one or few passwords into many systems Self-service password reset Audit trail for password changes
Most often, a credit card or ATM card Typically short (4 digits), so that can be memorized
on the card, sometimes encrypted by a master key second high-entropy key is stored on the card
Example: WPA
Passphrase is concatenated with SSID and then hashed 4096 times to create a symmetric key
One-time Passwords
A solution against eavesdropping and replay
attack
Option 1: shared list of one-time passwords Use password i+k after password i (k can be randomly agreed in real-time) Or, Sequentially updated one-time passwords New password i+1 is agreed after first authenticating with password i E.g., use a one-way hash function to create a sequence
Lamport: Pi= H(Pi+1), where H is a OWF
Note 1: authentication requires a counter Note 2: it would not be secure if sequence was going forward
Graphical Passwords
Select certain points in a picture
Image can be user-specific Password=points and click order
certain area Can serve for a first time authentication (assuming access to history data)
Used by service providers in the credit card industry, e.g., credit
bureaus, or new credit grantors Security is reasonable but not substantial, as adversary may know or collect information about target
Challenge-Response Identification
(strong authentication)
authenticate herself to the system using these questions (and reset her password) weak authentication
Questions are often trivial, with a small set of possible answers, and the answer may be known to someone who knows the person
freshness
Confounders are good against replay attacks, chosen-text attacks Examples: timestamps, random numbers, sequence numbers, other one-time numbers (nonces), Generated by one party, and then the other party cryptographically binds response to this number to ensure freshness
of the user, and are themselves signed by a CA The Ys correspond to secret information, which may be keys (Kab and Kba) or key exponents for a key exchange The third step is required if it is difficult to synchronize clocks, and with it timestamps need not be checked
Interleaving attack
Chaining protocol messages
Man-in-the-middle attack
Mutual authentication to foil adversary impersonating system
Reflection attack
Embed target identity, use uni-directional keys
Overview
Passwords may reveal Alices secret to Bob, who may then
impersonate her
With challenge-response protocols, Alice only reveals
without fearing that she may be providing anyone (Bob included) with any information about it
Note: RSA is also ZK, but most ZK protocols are more
A typical ZK protocol consists of n iterations Alice presents Bob a witness of her secret (commitment) Bob presents a challenge to Alice Alice responds to the challenge Bob checks that the answer is correct
Probability of Alice cheating in each iteration < 1 After n iterations, to get arbitrarily small probability
Proposed ZK Protocol
Alice chooses G1, and creates G2 that is isomorphic (using P1)
The graphs G1,G2 are public key, P1 is secret
Witness: Alice generates G3 that is isomorphic to G1 (using P2) Bob chooses Gi randomly and requires Alice to show mapping Alice responds
If G1, then the mapping is the generating permutation (P2) If G2, then the mapping requires applying both permutations (P1oP2)
Note:
Someone who didnt know P1 could have cheated in half the cases When run n times chances of cheating is exponentially low
the cases (e=1), he may be asked to compute rs Note 2. Bob cannot replay the communication he had with Alice to impersonate Alice to Charles, because in the cases Charles may present a different challenge
Properties of ZK Protocols
No degradation of the protocol with usage No information is revealed in polynomial runs Compared with Symmetric keys or HMAC Resist chosen-text attacks Compared to Public-Key Lower computation costs Usually higher communication costs (# of iterations) Relies on same unproven math assumptions
Illustration
Scanned Magnetic Stripe Scanned Magnetic Stripe
Encryption
0123456789012345
Encryption
0000100000000000
Decimalization
Keyed Number
Decimalization
0000
Comparison
OK/Not
Comparison
OK/Not
Passcode Generator
Smartcard
Smartcard Reader
Biometrics
Biometrics
Biometrics measure innate characteristics
something you are, hence hard to impersonate
Can be Physiological:
Fingerprints Retinal or Iris scanning Face recognition Hand geometry recognition
Or behavioral
Voice recognition (both physiological and behavioral) Handwriting/signature recognition Typing dynamics
Biometrics-based Authentication
Usually uses a pattern recognition approach
A profile is constructed for the true person A matching score is computed in each authentication attempt
Processes
Threshold-based Decision
Real-time matching score is thresholded (T)
Error types
(A) False alarms (False Positive, Type 2 error) (B) Misidentification (False Negative, Type 1 Error)
Fingerprints Analysis
Shapes:
ARCH WHORL LOOP
Minutiae:
END BIFURCATION ISLAND LAKE DOT
unique arrangement of minutiae for different people Non-intrusive, Reliable, Inexpensive Semiconductor or Optical Useful mostly for verification and less for identification
Hand Geometry
One of the first practically implemented techniques
physical access control: airports, secured corporate areas, etc. time and attendance monitoring
Non-intrusive
Iris Scanning
Human eye encodes 3.4bits/sqmm Extremely accurate: chance of duplication (including twins) < 1072 Fast comparison: Identification takes 2sec per 100,000 people in DB Sub-$1000 systems are available, but expensive to enroll many Considered a little intrusive / dangerous by some people Growing in market share vs. other solutions (patents expired)
Retinal Scanning
Works by identifying patterns in retinal blood vessels
then reduced to a signature of 96 bytes Preceded Iris scanning, but is less prevalent
considered more intrusive requires precise positioning of the eye requires removal of glasses
Face Recognition
Controlled scene access control Frontal view, similar distance, reasonable lighting Compare live image to an original, captured in similar environment Usually for verification purposes, with another ID Algorithms extract features, and compare relative positions of eyes,
nose, and mouth, nose width, and other factors Relatively user-friendly Not very accurate, and requires frequent updates
Very difficult in a random scene street, airports Much more difficult Law enforcement applications Privacy issues: a bill that makes this unlawful was shelved in March 2002
Voice Verification
Principle: speech dynamics are affected by physical
structure of mouth, vocal chords, sinus, etc. A voice signature can typically be formed from speech features, with relatively high accuracy
Each syllable typically has few dominant frequencies (formants) More accurate when user repeats a previously recorded sentence
richness of spoken language Applications: access control, call centers Example: www.verivoice.com
User is requested to spell a random string of digits
Signature Verification
Static verification Dynamic verification
Curvature, changes in x-y sign, acceleration, pen up time
Weaknesses of Biometrics
Possibility of false positives, and sometimes
unacceptable FP rate In identification applications: misidentification Replay attack, e.g., tape replay, cut finger
Health concerns Privacy concerns
Biometric Market
Intl Biometric Group
slowly over time. Advantage: relatively cheap (software) Typically shall be used in conjunction with another factor
e.g., use behavior profiling to supplement password authentication I believe that acceptance to this new form will grow, especially in
areas like intrusion detection and access control It also plays into the general trend of combining physical security and IT security
CAPTCHA
CAPTCHAs
Problem: robotic form filling can be used to
Guess passwords Abuse free services, primarily for spamming and phishing
Goal: Distinguish between a human user and a robot Method: Completely Automated Public Turing test to tell
an image
Counter-Captcha Methods
Guessing, e.g., if space is small, e.g., 4 digits