SlideShare a Scribd company logo
1 of 13
Chapter 6
Authenticating People
Chapter 6 Overview
The three authentication factors: what you know, you have, and
you are
Passwords, password bias, and search space calculations
Cryptographic building blocks: random choice, one-way hash
Authentication devices: personal tokens and biometrics
Basic issues in authentication policy
Elements of Authentication
Authentication Factors
Something you know
Password or PIN
Something you have
Key or token
Something you are
Personal trait
Traditional parallel terms:
Something you know, are, have
Multi-factor Authentication
Using different factors in authentication
NOT two or three instances of the same factor
Two-factor authentication
ATM authentication: ATM card + PIN
Biometric laptop: Fingerprint + password
NOT: Password + PIN
Three-factor authentication
Biometric access card: fingerprint + card + PIN
NOT: fingerprint + PIN + password
Authentication Threats
Focus in this chapter
Trick the authentication system or access assets through the
system
No “remote” attacks via Internet or LAN
Threats must have physical access to system
Range of threats
Weak threat – authentication is effective
Strong threat – authentication may work
Extreme threat – authentication not effective
Attacks on Authentication
Password Authentication
Each User ID is associated with a secret
User presents the secret when logging in
System checks the secret against the authentication database
Access granted if the secret matches
Risks
Shoulder surfing at the keyboard
Reading the password off of printer paper
Sniffing the password in transit or in RAM
Retrieving the authentication database
Password Hashing
One-Way Hash Functions
A Cryptographic Building Block function
We will see more building blocks later
Input:
An arbitrarily large amount of data, from a few bytes to
terabytes – RAM or files or devices
Output:
A fixed-size result
Impractical to reverse
Minor change to input = big change to output
Sniffing Passwords
Goal: intercept the password before it is hashed
Keystroke loggers
In hardware: Devices that connect to a keyboard's USB cable
In software: Procedures that eavesdrop on keyboard input
buffers
Password Guessing
DOD Password Guideline (1985) required a minimum 1 in a
million chance of successful guessing.
This was designed to defeat interactive password guessing: A
person or machine made numerous guesses
Some guessing succeeds based on social and personal
knowledge of the targeted victim
Modern network-based guessing can try tens of thousands of
alternatives very quickly.
Off-line Password Cracking
How Fast Is Off-line Cracking?
It depends on the size of the search space
i.e., how many legal – or likely – passwords?
Legal passwords are limited to specific sets of characters,
typically from the ASCII set
Single-case letters only:
Two letter passwords = 262
Three letter passwords = 263
… etc.
Password with L letters = 26L
Increasing the Search Space
Two options
Increase L – the length of passwords
Increase A – the range of letters and other characters in the
password's alphabet
Also called the character set
Search space for fixed length password = AL
Search space for range of lengths from 1 to L
A summation of individual lengths
Reduces to algebra: (AL+1 – 1)/(A – 1)
Speed of Cracking
Varies with different hardware and assumptions
Best case: Cracking with a desktop computer
Bad case: Using custom hardware
Worst case: Using the limits of physics
Exploiting Password Bias
Attacker doesn't try every possible password
Restricts the search space to likely passwords
Morris worm successfully used this attack
Similar attack used by Anonymous and Lulz in 2011 to extract
passwords from hashes
A dictionary attack
Uses a list of likely passwords as the password space
There are far fewer likely passwords than possible passwords
A Dictionary Attack
Dictionary Attacks Work
The attacks don't recover all passwords, but they recover
enough to make them worthwhile
Exploit the likelihood that some user choose weak
passwordsResearch or Incident% GuessedMorris worm,
estimated success (1988)~50%Klein's Study
(1990)24.2%Spafford's Study (1992)20%CERT Incident 1998-
0325.6%Cambridge study by Yan et al. (2000)35%Lulz and
Anonymous, estimated success (2011)30%
Assessing Bias-based Attacks
Entropy in data indicates the likelihood that a particular
message may appear
It considers the range of possible messages and the likelihood
of each one
Randomly chosen characters have more entropy that readable
text
Language enforces a bias in the choice of letter sequences
Estimated entropy in English text is 1 to 3 bits per character
Average Attack Space
An estimate of the likelihood that a trial-and-error attack will
succeed against a community
We construct a dictionary of passwords that the community is
likely to use
We estimate the likelihood that the community chooses those
passwords
V = S / (2L)
V = # of trials for a 50% chance of success
S = size of the search space (dictionary)
L = likelihood that users choose from dictionary
An Example: Four-digit Luggage Lock
Assume that there are hundreds of these locks being used
25% of the owners pick a 4-digit date as the combination
1 out of 366, not 1 out of 10000
V = 366 / (2 x .25)
V = 732
50% chance of success requires 732 date trials, not 5000
Must try different locks at random!
Password Ping-Pong
Attacks
Defenses
Passwords
Steal the Password File
Password Hashing
Guessing
Guess Detection
Social Engineering
Help Desk Restrictions
Keystroke Sniffing
Memory Protection
Password Sharing
Password Tokens
Network Sniffing
One-Time Passwords
??
Authentication Tokens
Benefits
Hard to attack – use a stronger secret than you get in a typical
password
Hard to forge – must hack the hardware
Hard to share – secret stored in hardware
Problems
Expensive – must buy hardware and/or special authentication
software
Can be lost or stolen
Risk of hardware failure
Types of Tokens
Passive tokens – the most common
Stores an unchanging credential
Examples: Card keys for hotel rooms, magnetic stripes on credit
cards
Active tokens – the most secure
Stores a secret that generates a different credential for each
login
Examples: One-time password tokens, smartphone
authentication apps
Challenge Response Authentication
Another Crypto Building Block
Challenge response is a protocol
An exchange of data to yield a shared result
Four steps:
Bob says, “Authenticate me!”
Alice says, “The challenge is 56923”
Bob calculates the response and says, “The response is 17390.”
Alice checks Bob's response against what she expected, using
the same calculation
Calculation relies on a shared secret
A Challenge Response Calculation
Photo: Courtesy of Dr. Richard Smith.
A One-time Password Token
Photo: Courtesy of Dr. Richard Smith.
Smartphones as Tokens
Lock/unlock adds an authentication factor
Unlock with memorized passcode
Separate authentication token
Smart watch other Bluetooth device
Biometric: fingerprint, face, iris, …
Mobile authentication techniques
One-time password via SMS messaging (bad)
Smartphone one-time password software
NFC protocols for financial cards
Token Vulnerabilities
Clone or borrow credential
Borrowing is possible, but detectable
Cloning should be impractical
Sniffing and trial-and-error guessing
Both should be impractical
Denial of service
Token may be lost, damaged, or stolen
Retrieve from backup
Attacker could steal the authentication database – 2011 incident
with SecurID
Biometric Authentication
Courtesy of Dr. Richard Smith
Elements of Biometric Authentication
Biometric Accuracy
Two types of errors
False acceptance – incorrectly detects a match with a credential
and the database
False rejection – fails to detect a match between a credential
and the database
False Acceptance Rate (FAR)
Likelihood of incorrectly authenticating someone as an
authorized user
Average attack space = 1 / (2 x AFAR)
False Rejection Rate (FRR) – denial of service
Biometric Vulnerabilities
Clone or borrow credential – often
Demonstrated many times with fingerprints, faces, voices, etc.
Sniff the credential and replay – often
Possible in networked and remote systems
Trial and error guessing – slight
Requires a team of attackers
Denial of service – possible
Retrieve from backup – possible
Authentication Requirements
Constructing a policy for an isolated computer
Answer these questions:
Is the computer used at home, at work, or both?
For each environment, are there threats?
For each threat, is it a weak or strong threat?
Weak threat: Might make an opportunistic attack on a
vulnerable computer
Strong threat: Will spend time and effort on an attack, if
unlikely to be detected and/or caught
Threats and Motivations
Weak Threat Environments
At home
Avoid opportunities for shoulder surfing
Do not write down passwords that are at risk of being stolen
Passwords should be hard to guess and easy to remember
At work – similar to home, except:
Passwords may be written down as long as the user keeps
physical possession of the list
Authentication tokens may be used
Strong Threat Environment
Using passwords
System should track failed password guesses to try to detect
guessing attacks
Protect against keyboard sniffers
Pick passwords that resist off-line attacks
The system should provide “secure attention”
Other options:
Passwords plus tokens (not for home use)
Passwords plus a locked smartphone
Passwords plus biometrics
Password Selection and Handling
Password selection
Choose passwords according to the risk faced by the assets it
protects
Pick strong passwords for valuable assets
Use different passwords to protect different types of assets (if
you reuse passwords)
Password protection
Keep an electronic, password-protected list
Keep a paper list of less critical passwords
Lock up a list of essential passwords safely
image2.jpg
image3.jpg
image4.jpg
image5.jpg
image6.jpg
image7.jpg
image8.jpg
image9.jpg
image10.jpg
image11.jpg
image12.jpg
image13.jpg
image14.jpg
image1.jpg
Length Requirements:
· 2–3 pages
· Coversheet
· List of References Page.
· Proofread - Edit for spelling, grammar, punctuation, etc.
· Use only course text, professional journal articles, or other
reputable resources
Complete the following using the course text, professional
journal articles, or other reputable resources. (NO Wikipedia)
Research a recent attack on an organization that involved
passwords.
· Name the organization, date of the attack, and loss to the
company.
· Describe the attack in detail. (i.e., type of password attack –
brute force, phishing, etc.)
· How did the perpetrator authenticate the system?
· Did the organization have a password policy in place?
· Recommend measures to protect against this type of attack in
the future. Be specific – that is, don’t just say develop a policy.
What should be in the policy?

More Related Content

Similar to Chapter 6Authenticating PeopleChapter 6 OverviewThe th

Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking   Chapter 12 - Encryption - Eric VanderburgEthical hacking   Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric VanderburgEric Vanderburg
 
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docx
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docxChapter 8Secret and Public KeysChapter 8 OverviewManag.docx
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docxbartholomeocoombs
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfjohn485745
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesPeter Wood
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Brian Gongol
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineeringphanleson
 

Similar to Chapter 6Authenticating PeopleChapter 6 OverviewThe th (20)

sheet2.pdf
sheet2.pdfsheet2.pdf
sheet2.pdf
 
doc2.pdf
doc2.pdfdoc2.pdf
doc2.pdf
 
paper2.pdf
paper2.pdfpaper2.pdf
paper2.pdf
 
lecture1.pdf
lecture1.pdflecture1.pdf
lecture1.pdf
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking   Chapter 12 - Encryption - Eric VanderburgEthical hacking   Chapter 12 - Encryption - Eric Vanderburg
Ethical hacking Chapter 12 - Encryption - Eric Vanderburg
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docx
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docxChapter 8Secret and Public KeysChapter 8 OverviewManag.docx
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docx
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 

More from samirapdcosden

I need help with completing, analyzing on the schedule L of an 1120 .docx
I need help with completing, analyzing on the schedule L of an 1120 .docxI need help with completing, analyzing on the schedule L of an 1120 .docx
I need help with completing, analyzing on the schedule L of an 1120 .docxsamirapdcosden
 
I need help with my final paper please. I have attached my final pap.docx
I need help with my final paper please. I have attached my final pap.docxI need help with my final paper please. I have attached my final pap.docx
I need help with my final paper please. I have attached my final pap.docxsamirapdcosden
 
i need help with answering these two questions by writing essay..docx
i need help with answering these two questions by writing essay..docxi need help with answering these two questions by writing essay..docx
i need help with answering these two questions by writing essay..docxsamirapdcosden
 
I need help rewording this and is due by 1230 tonight.Standard .docx
I need help rewording this and is due by 1230 tonight.Standard .docxI need help rewording this and is due by 1230 tonight.Standard .docx
I need help rewording this and is due by 1230 tonight.Standard .docxsamirapdcosden
 
i need help in writing an essay for history class. It should be two .docx
i need help in writing an essay for history class. It should be two .docxi need help in writing an essay for history class. It should be two .docx
i need help in writing an essay for history class. It should be two .docxsamirapdcosden
 
I need help on a topic in researching. the Topic is Many people .docx
I need help on a topic in researching. the Topic is Many people .docxI need help on a topic in researching. the Topic is Many people .docx
I need help on a topic in researching. the Topic is Many people .docxsamirapdcosden
 
I need help with it.Team PresentationCrisis Communication .docx
I need help with it.Team PresentationCrisis Communication .docxI need help with it.Team PresentationCrisis Communication .docx
I need help with it.Team PresentationCrisis Communication .docxsamirapdcosden
 
I need good translation into EnglishПервая публикация 11-й номе.docx
I need good translation into EnglishПервая публикация 11-й номе.docxI need good translation into EnglishПервая публикация 11-й номе.docx
I need good translation into EnglishПервая публикация 11-й номе.docxsamirapdcosden
 
I need each question answered and needs be separte answered.The Hu.docx
I need each question answered and needs be separte answered.The Hu.docxI need each question answered and needs be separte answered.The Hu.docx
I need each question answered and needs be separte answered.The Hu.docxsamirapdcosden
 
I need help with an assignment.Develop a five page APA style paper.docx
I need help with an assignment.Develop a five page APA style paper.docxI need help with an assignment.Develop a five page APA style paper.docx
I need help with an assignment.Develop a five page APA style paper.docxsamirapdcosden
 
i need help in computer science CSIS 101 in moodle and wordpress-.docx
i need help in computer science CSIS 101 in moodle and wordpress-.docxi need help in computer science CSIS 101 in moodle and wordpress-.docx
i need help in computer science CSIS 101 in moodle and wordpress-.docxsamirapdcosden
 
I need help with 200 matching questions about the movie The Odyssey.docx
I need help with 200 matching questions about the movie The Odyssey.docxI need help with 200 matching questions about the movie The Odyssey.docx
I need help with 200 matching questions about the movie The Odyssey.docxsamirapdcosden
 
I need essay around 500 to 600 word At least 2 sources anything .docx
I need essay around 500 to 600 word At least 2 sources anything .docxI need essay around 500 to 600 word At least 2 sources anything .docx
I need essay around 500 to 600 word At least 2 sources anything .docxsamirapdcosden
 
I need change answer number 1 and ,  Second  The exhibits need to be.docx
I need change answer number 1 and ,  Second  The exhibits need to be.docxI need change answer number 1 and ,  Second  The exhibits need to be.docx
I need change answer number 1 and ,  Second  The exhibits need to be.docxsamirapdcosden
 
I need at least a 6 page paper apa format .  Please follow the rubic.docx
I need at least a 6 page paper apa format .  Please follow the rubic.docxI need at least a 6 page paper apa format .  Please follow the rubic.docx
I need at least a 6 page paper apa format .  Please follow the rubic.docxsamirapdcosden
 
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docx
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docxI need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docx
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docxsamirapdcosden
 
I need at least a 10 page paper. Apa format following with a sample .docx
I need at least a 10 page paper. Apa format following with a sample .docxI need at least a 10 page paper. Apa format following with a sample .docx
I need at least a 10 page paper. Apa format following with a sample .docxsamirapdcosden
 
I need an origanal term paper explaining how the role of so called.docx
I need an origanal term paper explaining how the role of so called.docxI need an origanal term paper explaining how the role of so called.docx
I need an origanal term paper explaining how the role of so called.docxsamirapdcosden
 
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docx
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docxi need an explanation of two Tai Chi postures. Like how to do it. Fo.docx
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docxsamirapdcosden
 
I need an expert writer and someone major in Econresearcher to Help.docx
I need an expert writer and someone major in Econresearcher to Help.docxI need an expert writer and someone major in Econresearcher to Help.docx
I need an expert writer and someone major in Econresearcher to Help.docxsamirapdcosden
 

More from samirapdcosden (20)

I need help with completing, analyzing on the schedule L of an 1120 .docx
I need help with completing, analyzing on the schedule L of an 1120 .docxI need help with completing, analyzing on the schedule L of an 1120 .docx
I need help with completing, analyzing on the schedule L of an 1120 .docx
 
I need help with my final paper please. I have attached my final pap.docx
I need help with my final paper please. I have attached my final pap.docxI need help with my final paper please. I have attached my final pap.docx
I need help with my final paper please. I have attached my final pap.docx
 
i need help with answering these two questions by writing essay..docx
i need help with answering these two questions by writing essay..docxi need help with answering these two questions by writing essay..docx
i need help with answering these two questions by writing essay..docx
 
I need help rewording this and is due by 1230 tonight.Standard .docx
I need help rewording this and is due by 1230 tonight.Standard .docxI need help rewording this and is due by 1230 tonight.Standard .docx
I need help rewording this and is due by 1230 tonight.Standard .docx
 
i need help in writing an essay for history class. It should be two .docx
i need help in writing an essay for history class. It should be two .docxi need help in writing an essay for history class. It should be two .docx
i need help in writing an essay for history class. It should be two .docx
 
I need help on a topic in researching. the Topic is Many people .docx
I need help on a topic in researching. the Topic is Many people .docxI need help on a topic in researching. the Topic is Many people .docx
I need help on a topic in researching. the Topic is Many people .docx
 
I need help with it.Team PresentationCrisis Communication .docx
I need help with it.Team PresentationCrisis Communication .docxI need help with it.Team PresentationCrisis Communication .docx
I need help with it.Team PresentationCrisis Communication .docx
 
I need good translation into EnglishПервая публикация 11-й номе.docx
I need good translation into EnglishПервая публикация 11-й номе.docxI need good translation into EnglishПервая публикация 11-й номе.docx
I need good translation into EnglishПервая публикация 11-й номе.docx
 
I need each question answered and needs be separte answered.The Hu.docx
I need each question answered and needs be separte answered.The Hu.docxI need each question answered and needs be separte answered.The Hu.docx
I need each question answered and needs be separte answered.The Hu.docx
 
I need help with an assignment.Develop a five page APA style paper.docx
I need help with an assignment.Develop a five page APA style paper.docxI need help with an assignment.Develop a five page APA style paper.docx
I need help with an assignment.Develop a five page APA style paper.docx
 
i need help in computer science CSIS 101 in moodle and wordpress-.docx
i need help in computer science CSIS 101 in moodle and wordpress-.docxi need help in computer science CSIS 101 in moodle and wordpress-.docx
i need help in computer science CSIS 101 in moodle and wordpress-.docx
 
I need help with 200 matching questions about the movie The Odyssey.docx
I need help with 200 matching questions about the movie The Odyssey.docxI need help with 200 matching questions about the movie The Odyssey.docx
I need help with 200 matching questions about the movie The Odyssey.docx
 
I need essay around 500 to 600 word At least 2 sources anything .docx
I need essay around 500 to 600 word At least 2 sources anything .docxI need essay around 500 to 600 word At least 2 sources anything .docx
I need essay around 500 to 600 word At least 2 sources anything .docx
 
I need change answer number 1 and ,  Second  The exhibits need to be.docx
I need change answer number 1 and ,  Second  The exhibits need to be.docxI need change answer number 1 and ,  Second  The exhibits need to be.docx
I need change answer number 1 and ,  Second  The exhibits need to be.docx
 
I need at least a 6 page paper apa format .  Please follow the rubic.docx
I need at least a 6 page paper apa format .  Please follow the rubic.docxI need at least a 6 page paper apa format .  Please follow the rubic.docx
I need at least a 6 page paper apa format .  Please follow the rubic.docx
 
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docx
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docxI need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docx
I need APA style, 1-2 pages, 12 pt Time New Roman.Thank You in Adv.docx
 
I need at least a 10 page paper. Apa format following with a sample .docx
I need at least a 10 page paper. Apa format following with a sample .docxI need at least a 10 page paper. Apa format following with a sample .docx
I need at least a 10 page paper. Apa format following with a sample .docx
 
I need an origanal term paper explaining how the role of so called.docx
I need an origanal term paper explaining how the role of so called.docxI need an origanal term paper explaining how the role of so called.docx
I need an origanal term paper explaining how the role of so called.docx
 
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docx
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docxi need an explanation of two Tai Chi postures. Like how to do it. Fo.docx
i need an explanation of two Tai Chi postures. Like how to do it. Fo.docx
 
I need an expert writer and someone major in Econresearcher to Help.docx
I need an expert writer and someone major in Econresearcher to Help.docxI need an expert writer and someone major in Econresearcher to Help.docx
I need an expert writer and someone major in Econresearcher to Help.docx
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Chapter 6Authenticating PeopleChapter 6 OverviewThe th

  • 1. Chapter 6 Authenticating People Chapter 6 Overview The three authentication factors: what you know, you have, and you are Passwords, password bias, and search space calculations Cryptographic building blocks: random choice, one-way hash Authentication devices: personal tokens and biometrics Basic issues in authentication policy Elements of Authentication Authentication Factors Something you know Password or PIN Something you have Key or token Something you are Personal trait Traditional parallel terms: Something you know, are, have Multi-factor Authentication Using different factors in authentication NOT two or three instances of the same factor
  • 2. Two-factor authentication ATM authentication: ATM card + PIN Biometric laptop: Fingerprint + password NOT: Password + PIN Three-factor authentication Biometric access card: fingerprint + card + PIN NOT: fingerprint + PIN + password Authentication Threats Focus in this chapter Trick the authentication system or access assets through the system No “remote” attacks via Internet or LAN Threats must have physical access to system Range of threats Weak threat – authentication is effective Strong threat – authentication may work Extreme threat – authentication not effective Attacks on Authentication Password Authentication Each User ID is associated with a secret User presents the secret when logging in System checks the secret against the authentication database Access granted if the secret matches Risks Shoulder surfing at the keyboard Reading the password off of printer paper Sniffing the password in transit or in RAM Retrieving the authentication database
  • 3. Password Hashing One-Way Hash Functions A Cryptographic Building Block function We will see more building blocks later Input: An arbitrarily large amount of data, from a few bytes to terabytes – RAM or files or devices Output: A fixed-size result Impractical to reverse Minor change to input = big change to output Sniffing Passwords Goal: intercept the password before it is hashed Keystroke loggers In hardware: Devices that connect to a keyboard's USB cable In software: Procedures that eavesdrop on keyboard input buffers Password Guessing DOD Password Guideline (1985) required a minimum 1 in a million chance of successful guessing. This was designed to defeat interactive password guessing: A person or machine made numerous guesses Some guessing succeeds based on social and personal knowledge of the targeted victim Modern network-based guessing can try tens of thousands of alternatives very quickly.
  • 4. Off-line Password Cracking How Fast Is Off-line Cracking? It depends on the size of the search space i.e., how many legal – or likely – passwords? Legal passwords are limited to specific sets of characters, typically from the ASCII set Single-case letters only: Two letter passwords = 262 Three letter passwords = 263 … etc. Password with L letters = 26L Increasing the Search Space Two options Increase L – the length of passwords Increase A – the range of letters and other characters in the password's alphabet Also called the character set Search space for fixed length password = AL Search space for range of lengths from 1 to L A summation of individual lengths Reduces to algebra: (AL+1 – 1)/(A – 1) Speed of Cracking Varies with different hardware and assumptions Best case: Cracking with a desktop computer Bad case: Using custom hardware Worst case: Using the limits of physics
  • 5. Exploiting Password Bias Attacker doesn't try every possible password Restricts the search space to likely passwords Morris worm successfully used this attack Similar attack used by Anonymous and Lulz in 2011 to extract passwords from hashes A dictionary attack Uses a list of likely passwords as the password space There are far fewer likely passwords than possible passwords A Dictionary Attack Dictionary Attacks Work The attacks don't recover all passwords, but they recover enough to make them worthwhile Exploit the likelihood that some user choose weak passwordsResearch or Incident% GuessedMorris worm, estimated success (1988)~50%Klein's Study (1990)24.2%Spafford's Study (1992)20%CERT Incident 1998- 0325.6%Cambridge study by Yan et al. (2000)35%Lulz and Anonymous, estimated success (2011)30% Assessing Bias-based Attacks Entropy in data indicates the likelihood that a particular message may appear It considers the range of possible messages and the likelihood of each one Randomly chosen characters have more entropy that readable text Language enforces a bias in the choice of letter sequences
  • 6. Estimated entropy in English text is 1 to 3 bits per character Average Attack Space An estimate of the likelihood that a trial-and-error attack will succeed against a community We construct a dictionary of passwords that the community is likely to use We estimate the likelihood that the community chooses those passwords V = S / (2L) V = # of trials for a 50% chance of success S = size of the search space (dictionary) L = likelihood that users choose from dictionary An Example: Four-digit Luggage Lock Assume that there are hundreds of these locks being used 25% of the owners pick a 4-digit date as the combination 1 out of 366, not 1 out of 10000 V = 366 / (2 x .25) V = 732 50% chance of success requires 732 date trials, not 5000 Must try different locks at random! Password Ping-Pong Attacks Defenses Passwords Steal the Password File Password Hashing Guessing
  • 7. Guess Detection Social Engineering Help Desk Restrictions Keystroke Sniffing Memory Protection Password Sharing Password Tokens Network Sniffing One-Time Passwords ?? Authentication Tokens Benefits Hard to attack – use a stronger secret than you get in a typical password Hard to forge – must hack the hardware Hard to share – secret stored in hardware Problems Expensive – must buy hardware and/or special authentication software Can be lost or stolen Risk of hardware failure Types of Tokens
  • 8. Passive tokens – the most common Stores an unchanging credential Examples: Card keys for hotel rooms, magnetic stripes on credit cards Active tokens – the most secure Stores a secret that generates a different credential for each login Examples: One-time password tokens, smartphone authentication apps Challenge Response Authentication Another Crypto Building Block Challenge response is a protocol An exchange of data to yield a shared result Four steps: Bob says, “Authenticate me!” Alice says, “The challenge is 56923” Bob calculates the response and says, “The response is 17390.” Alice checks Bob's response against what she expected, using the same calculation Calculation relies on a shared secret A Challenge Response Calculation Photo: Courtesy of Dr. Richard Smith. A One-time Password Token Photo: Courtesy of Dr. Richard Smith.
  • 9. Smartphones as Tokens Lock/unlock adds an authentication factor Unlock with memorized passcode Separate authentication token Smart watch other Bluetooth device Biometric: fingerprint, face, iris, … Mobile authentication techniques One-time password via SMS messaging (bad) Smartphone one-time password software NFC protocols for financial cards Token Vulnerabilities Clone or borrow credential Borrowing is possible, but detectable Cloning should be impractical Sniffing and trial-and-error guessing Both should be impractical Denial of service Token may be lost, damaged, or stolen Retrieve from backup Attacker could steal the authentication database – 2011 incident with SecurID Biometric Authentication Courtesy of Dr. Richard Smith Elements of Biometric Authentication Biometric Accuracy
  • 10. Two types of errors False acceptance – incorrectly detects a match with a credential and the database False rejection – fails to detect a match between a credential and the database False Acceptance Rate (FAR) Likelihood of incorrectly authenticating someone as an authorized user Average attack space = 1 / (2 x AFAR) False Rejection Rate (FRR) – denial of service Biometric Vulnerabilities Clone or borrow credential – often Demonstrated many times with fingerprints, faces, voices, etc. Sniff the credential and replay – often Possible in networked and remote systems Trial and error guessing – slight Requires a team of attackers Denial of service – possible Retrieve from backup – possible Authentication Requirements Constructing a policy for an isolated computer Answer these questions: Is the computer used at home, at work, or both? For each environment, are there threats? For each threat, is it a weak or strong threat? Weak threat: Might make an opportunistic attack on a vulnerable computer Strong threat: Will spend time and effort on an attack, if unlikely to be detected and/or caught Threats and Motivations
  • 11. Weak Threat Environments At home Avoid opportunities for shoulder surfing Do not write down passwords that are at risk of being stolen Passwords should be hard to guess and easy to remember At work – similar to home, except: Passwords may be written down as long as the user keeps physical possession of the list Authentication tokens may be used Strong Threat Environment Using passwords System should track failed password guesses to try to detect guessing attacks Protect against keyboard sniffers Pick passwords that resist off-line attacks The system should provide “secure attention” Other options: Passwords plus tokens (not for home use) Passwords plus a locked smartphone Passwords plus biometrics Password Selection and Handling Password selection Choose passwords according to the risk faced by the assets it protects Pick strong passwords for valuable assets Use different passwords to protect different types of assets (if you reuse passwords) Password protection Keep an electronic, password-protected list
  • 12. Keep a paper list of less critical passwords Lock up a list of essential passwords safely image2.jpg image3.jpg image4.jpg image5.jpg image6.jpg image7.jpg image8.jpg image9.jpg image10.jpg image11.jpg image12.jpg image13.jpg image14.jpg image1.jpg Length Requirements: · 2–3 pages · Coversheet · List of References Page. · Proofread - Edit for spelling, grammar, punctuation, etc. · Use only course text, professional journal articles, or other reputable resources Complete the following using the course text, professional journal articles, or other reputable resources. (NO Wikipedia) Research a recent attack on an organization that involved passwords. · Name the organization, date of the attack, and loss to the company. · Describe the attack in detail. (i.e., type of password attack – brute force, phishing, etc.) · How did the perpetrator authenticate the system? · Did the organization have a password policy in place?
  • 13. · Recommend measures to protect against this type of attack in the future. Be specific – that is, don’t just say develop a policy. What should be in the policy?