SlideShare a Scribd company logo
1 of 20
Authentication mechanism enhancement
utilising secure repository for passwordless
handshake
Ioannis A. Pikrammenos, Panagiotis Tolis and
Panagiotis Perakis
School of Computing, Mediterranean College
– University of Derby, Athens, Greece
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019
DOI: 10.5121/ijnsa.2019.11401
2
Introduction
• prevent the exposure of the user’s
password during the authentication
phase in a network
• change of passwords infrequent intervals
leaves little room for attackers
• enhanced capabilities of password
utilization improve the performance of the
systems
3
Structure
1. literature review
2. authentication protocols
3. security features of each proposal
4. proposed solution and its main
outcomes
5. discussion about challenges and future
work
6. conclusions
4
Authentication
• Authentication comes from the Greek
lemma αὐθεντικός (authentikos)
– is confirming the truth of an attribute of a
single piece of data claimed to be true by an
entity
• user identification was introduced to allow
the system to identify the user and thus
to specify his access privileges
5
Username
• should be created using the system-wide
character set
– should not be separated into discrete words
– should meet a specific limit of characters
• lower limit is one (1) character as there shouldn’t
be a “no one” (from Homer Odyssey) user
• systems-specific extend
– multiple systems = diverse usernames
• username once created cannot be
altered
6
Password
• to prove user authenticity to the system
• the more secure a password is the more
difficult it becomes for humans to conceal or
even remember it
– transmission of the password “over the air”
– password codeword is also exposed by its shape
– protection of the communication channel
– man-in-the-middle attack
– secrets change in time
7
Authentication procedure
• how one party verifies another's identity
• credentials are transmitted over the
network
• technologies used for security proposal
– Lightweight Directory Access Protocol,
– Kerberos
8
LDAP
• by providing a Domain Name (DN) and a set of
credentials, a client can use the bind
operation to authenticate itself to the directory
• there are different types of bind methods in
LDAP
– In a simple bind, the user presents a clear-text DN
and password to the LDAP server
9
Threats against LDAP
• Heartbleed
– length of payload greater than the amount of data
expected in the HeartbeatRequest message
• Session Hijacking
– Man-in-the-Middle attack
• the harassment of the communication channel
imposes severe security threats to the
authentication service
– the service can be restored while the incident
cannot
10
Kerberos
• offers a means of validating the identity of
individuals on an accessible
(unprotected) network
• conducts authentication by using
standard cryptography
– symmetric-key cryptography
– public-key cryptography
11
Kerberos authentication
12
Threats against Kerberos
• Rainbow table, given the poor-quality of the
user-selected passwords
• illegitimate person gains access to the KDC
database
• Man-In-The-Middle record all data on the wire
and even alter the transmitted data selectively
• weakness is that the key kC used to encrypt
the client's credentials is derived from a
password, and passwords are notoriously
vulnerable
13
Proposition
• Credentials’ current values are deterministic for
the authentication though stochastic in time
– set of passwords are linked to each username
• Username current value may be kept away
from the user knowledge
• one could identify the credentials set through
the identifier of the selected password’s thesis
along with the pre-computed list in the secure
media
– no one except the issuer-authentication service may
know the actual value of the identified password
14
Proposition – Smart Card
• Secrets precomputed and stored in a
secure repository
• under the control of the user but not
under his authority
• valid password is identified through the
list number
• alteration of the valid password may take
effect without the exposure of its value
15
Proposition - Kerberos
16
Kerberos oriented implementation
1. Authority Service Request step needs to be changed
• smart card’s ID as well as the enlisted password ID
AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime,
SCidCode, Pid)
2. database scheme at the AS has to transform the password
record from a fixed size variable to a fixed size list
• objectClass: SCidCodeuserPassword1
• objectClass: SCidCodeuserPassword2
• …
3. turn-based identification mechanism could be utilized when a
password has to be changed
4. the passwords may now be selected by the system
• the scope of using string2key and namely PBKDF2 mechanisms is
raised
5. host machine does not contain a local repository
• Ticket Granting Server needs to redirect the ticket’s destination from
the machine to the card
17
LDAP oriented implementation
1. smart card ID should be stored in AS
repository and linked to the user’s
principal name
2. password repository should be changed
from the terminal’s file system to the
smart card
18
Eliminated Threats
• Man in the Middle attack
– even by hijacking the session will have no clue of
the secret
• Dictionary – Brute force attacks
– there is no fixed length or format of the password
• Clone attack
– replay legitimate messages to hijack a session is not
further handful because of the dynamic change of
passwords
• Social Engineering
– user will not be able to expose something that
he/she does not know
19
Related work – Future wok
• the majority of current security proposals based
on Kerberos protocol are related to the
cryptographic aspect
• a smart card integration design was proposed
– swap the encryption-decryption mechanism from
terminal to smart card
• the above resolve the issues created by
dictionary attacks
– remains vulnerable against Brute Force and Man in
the Middle attacks
• If the smart card is breached, then the secrets
are exposed
– Future work could focus on securing the
authentication process end-to-end
20
Conclusions
• proposed solution is implemented alike
LDAP and Kerberos.
• a leeway of enhancements is presented
• changes required in protocols are
minimal while the impact is great
• authentication procedure is further
hardened, freed from known
vulnerabilities

More Related Content

What's hot

Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 
Digital signature
Digital signatureDigital signature
Digital signatureJanani S
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Shakas Technologies
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 

What's hot (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Cryptography
CryptographyCryptography
Cryptography
 
Security
SecuritySecurity
Security
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Ch14
Ch14Ch14
Ch14
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Security
SecuritySecurity
Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Similar to AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Shumon Huque
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageat MicroFocus Italy ❖✔
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 

Similar to AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE (20)

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Unit08
Unit08Unit08
Unit08
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantage
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

  • 1. Authentication mechanism enhancement utilising secure repository for passwordless handshake Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis School of Computing, Mediterranean College – University of Derby, Athens, Greece International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019 DOI: 10.5121/ijnsa.2019.11401
  • 2. 2 Introduction • prevent the exposure of the user’s password during the authentication phase in a network • change of passwords infrequent intervals leaves little room for attackers • enhanced capabilities of password utilization improve the performance of the systems
  • 3. 3 Structure 1. literature review 2. authentication protocols 3. security features of each proposal 4. proposed solution and its main outcomes 5. discussion about challenges and future work 6. conclusions
  • 4. 4 Authentication • Authentication comes from the Greek lemma αὐθεντικός (authentikos) – is confirming the truth of an attribute of a single piece of data claimed to be true by an entity • user identification was introduced to allow the system to identify the user and thus to specify his access privileges
  • 5. 5 Username • should be created using the system-wide character set – should not be separated into discrete words – should meet a specific limit of characters • lower limit is one (1) character as there shouldn’t be a “no one” (from Homer Odyssey) user • systems-specific extend – multiple systems = diverse usernames • username once created cannot be altered
  • 6. 6 Password • to prove user authenticity to the system • the more secure a password is the more difficult it becomes for humans to conceal or even remember it – transmission of the password “over the air” – password codeword is also exposed by its shape – protection of the communication channel – man-in-the-middle attack – secrets change in time
  • 7. 7 Authentication procedure • how one party verifies another's identity • credentials are transmitted over the network • technologies used for security proposal – Lightweight Directory Access Protocol, – Kerberos
  • 8. 8 LDAP • by providing a Domain Name (DN) and a set of credentials, a client can use the bind operation to authenticate itself to the directory • there are different types of bind methods in LDAP – In a simple bind, the user presents a clear-text DN and password to the LDAP server
  • 9. 9 Threats against LDAP • Heartbleed – length of payload greater than the amount of data expected in the HeartbeatRequest message • Session Hijacking – Man-in-the-Middle attack • the harassment of the communication channel imposes severe security threats to the authentication service – the service can be restored while the incident cannot
  • 10. 10 Kerberos • offers a means of validating the identity of individuals on an accessible (unprotected) network • conducts authentication by using standard cryptography – symmetric-key cryptography – public-key cryptography
  • 12. 12 Threats against Kerberos • Rainbow table, given the poor-quality of the user-selected passwords • illegitimate person gains access to the KDC database • Man-In-The-Middle record all data on the wire and even alter the transmitted data selectively • weakness is that the key kC used to encrypt the client's credentials is derived from a password, and passwords are notoriously vulnerable
  • 13. 13 Proposition • Credentials’ current values are deterministic for the authentication though stochastic in time – set of passwords are linked to each username • Username current value may be kept away from the user knowledge • one could identify the credentials set through the identifier of the selected password’s thesis along with the pre-computed list in the secure media – no one except the issuer-authentication service may know the actual value of the identified password
  • 14. 14 Proposition – Smart Card • Secrets precomputed and stored in a secure repository • under the control of the user but not under his authority • valid password is identified through the list number • alteration of the valid password may take effect without the exposure of its value
  • 16. 16 Kerberos oriented implementation 1. Authority Service Request step needs to be changed • smart card’s ID as well as the enlisted password ID AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime, SCidCode, Pid) 2. database scheme at the AS has to transform the password record from a fixed size variable to a fixed size list • objectClass: SCidCodeuserPassword1 • objectClass: SCidCodeuserPassword2 • … 3. turn-based identification mechanism could be utilized when a password has to be changed 4. the passwords may now be selected by the system • the scope of using string2key and namely PBKDF2 mechanisms is raised 5. host machine does not contain a local repository • Ticket Granting Server needs to redirect the ticket’s destination from the machine to the card
  • 17. 17 LDAP oriented implementation 1. smart card ID should be stored in AS repository and linked to the user’s principal name 2. password repository should be changed from the terminal’s file system to the smart card
  • 18. 18 Eliminated Threats • Man in the Middle attack – even by hijacking the session will have no clue of the secret • Dictionary – Brute force attacks – there is no fixed length or format of the password • Clone attack – replay legitimate messages to hijack a session is not further handful because of the dynamic change of passwords • Social Engineering – user will not be able to expose something that he/she does not know
  • 19. 19 Related work – Future wok • the majority of current security proposals based on Kerberos protocol are related to the cryptographic aspect • a smart card integration design was proposed – swap the encryption-decryption mechanism from terminal to smart card • the above resolve the issues created by dictionary attacks – remains vulnerable against Brute Force and Man in the Middle attacks • If the smart card is breached, then the secrets are exposed – Future work could focus on securing the authentication process end-to-end
  • 20. 20 Conclusions • proposed solution is implemented alike LDAP and Kerberos. • a leeway of enhancements is presented • changes required in protocols are minimal while the impact is great • authentication procedure is further hardened, freed from known vulnerabilities