SlideShare a Scribd company logo
Authentication mechanism enhancement
utilising secure repository for passwordless
handshake
Ioannis A. Pikrammenos, Panagiotis Tolis and
Panagiotis Perakis
School of Computing, Mediterranean College
– University of Derby, Athens, Greece
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019
DOI: 10.5121/ijnsa.2019.11401
2
Introduction
• prevent the exposure of the user’s
password during the authentication
phase in a network
• change of passwords infrequent intervals
leaves little room for attackers
• enhanced capabilities of password
utilization improve the performance of the
systems
3
Structure
1. literature review
2. authentication protocols
3. security features of each proposal
4. proposed solution and its main
outcomes
5. discussion about challenges and future
work
6. conclusions
4
Authentication
• Authentication comes from the Greek
lemma αὐθεντικός (authentikos)
– is confirming the truth of an attribute of a
single piece of data claimed to be true by an
entity
• user identification was introduced to allow
the system to identify the user and thus
to specify his access privileges
5
Username
• should be created using the system-wide
character set
– should not be separated into discrete words
– should meet a specific limit of characters
• lower limit is one (1) character as there shouldn’t
be a “no one” (from Homer Odyssey) user
• systems-specific extend
– multiple systems = diverse usernames
• username once created cannot be
altered
6
Password
• to prove user authenticity to the system
• the more secure a password is the more
difficult it becomes for humans to conceal or
even remember it
– transmission of the password “over the air”
– password codeword is also exposed by its shape
– protection of the communication channel
– man-in-the-middle attack
– secrets change in time
7
Authentication procedure
• how one party verifies another's identity
• credentials are transmitted over the
network
• technologies used for security proposal
– Lightweight Directory Access Protocol,
– Kerberos
8
LDAP
• by providing a Domain Name (DN) and a set of
credentials, a client can use the bind
operation to authenticate itself to the directory
• there are different types of bind methods in
LDAP
– In a simple bind, the user presents a clear-text DN
and password to the LDAP server
9
Threats against LDAP
• Heartbleed
– length of payload greater than the amount of data
expected in the HeartbeatRequest message
• Session Hijacking
– Man-in-the-Middle attack
• the harassment of the communication channel
imposes severe security threats to the
authentication service
– the service can be restored while the incident
cannot
10
Kerberos
• offers a means of validating the identity of
individuals on an accessible
(unprotected) network
• conducts authentication by using
standard cryptography
– symmetric-key cryptography
– public-key cryptography
11
Kerberos authentication
12
Threats against Kerberos
• Rainbow table, given the poor-quality of the
user-selected passwords
• illegitimate person gains access to the KDC
database
• Man-In-The-Middle record all data on the wire
and even alter the transmitted data selectively
• weakness is that the key kC used to encrypt
the client's credentials is derived from a
password, and passwords are notoriously
vulnerable
13
Proposition
• Credentials’ current values are deterministic for
the authentication though stochastic in time
– set of passwords are linked to each username
• Username current value may be kept away
from the user knowledge
• one could identify the credentials set through
the identifier of the selected password’s thesis
along with the pre-computed list in the secure
media
– no one except the issuer-authentication service may
know the actual value of the identified password
14
Proposition – Smart Card
• Secrets precomputed and stored in a
secure repository
• under the control of the user but not
under his authority
• valid password is identified through the
list number
• alteration of the valid password may take
effect without the exposure of its value
15
Proposition - Kerberos
16
Kerberos oriented implementation
1. Authority Service Request step needs to be changed
• smart card’s ID as well as the enlisted password ID
AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime,
SCidCode, Pid)
2. database scheme at the AS has to transform the password
record from a fixed size variable to a fixed size list
• objectClass: SCidCodeuserPassword1
• objectClass: SCidCodeuserPassword2
• …
3. turn-based identification mechanism could be utilized when a
password has to be changed
4. the passwords may now be selected by the system
• the scope of using string2key and namely PBKDF2 mechanisms is
raised
5. host machine does not contain a local repository
• Ticket Granting Server needs to redirect the ticket’s destination from
the machine to the card
17
LDAP oriented implementation
1. smart card ID should be stored in AS
repository and linked to the user’s
principal name
2. password repository should be changed
from the terminal’s file system to the
smart card
18
Eliminated Threats
• Man in the Middle attack
– even by hijacking the session will have no clue of
the secret
• Dictionary – Brute force attacks
– there is no fixed length or format of the password
• Clone attack
– replay legitimate messages to hijack a session is not
further handful because of the dynamic change of
passwords
• Social Engineering
– user will not be able to expose something that
he/she does not know
19
Related work – Future wok
• the majority of current security proposals based
on Kerberos protocol are related to the
cryptographic aspect
• a smart card integration design was proposed
– swap the encryption-decryption mechanism from
terminal to smart card
• the above resolve the issues created by
dictionary attacks
– remains vulnerable against Brute Force and Man in
the Middle attacks
• If the smart card is breached, then the secrets
are exposed
– Future work could focus on securing the
authentication process end-to-end
20
Conclusions
• proposed solution is implemented alike
LDAP and Kerberos.
• a leeway of enhancements is presented
• changes required in protocols are
minimal while the impact is great
• authentication procedure is further
hardened, freed from known
vulnerabilities

More Related Content

What's hot

Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Security
SecuritySecurity
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
Bangladesh Network Operators Group
 
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
 
Security Basics
Security BasicsSecurity Basics
Security Basics
ArchitecTerra Ltd.
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Shakas Technologies
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
 
Security
SecuritySecurity
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 

What's hot (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Cryptography
CryptographyCryptography
Cryptography
 
Security
SecuritySecurity
Security
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Ch14
Ch14Ch14
Ch14
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Security
SecuritySecurity
Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Similar to AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
kamalakantas
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
Flaskdata.io
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
Nishant Pahad
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Shumon Huque
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
DIKSHABORKAR8
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantage
at MicroFocus Italy ❖✔
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
STS
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
DhananjaySingh23178
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
KIYALIBAN1
 

Similar to AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE (20)

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Unit08
Unit08Unit08
Unit08
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantage
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 

Recently uploaded

AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

  • 1. Authentication mechanism enhancement utilising secure repository for passwordless handshake Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis School of Computing, Mediterranean College – University of Derby, Athens, Greece International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019 DOI: 10.5121/ijnsa.2019.11401
  • 2. 2 Introduction • prevent the exposure of the user’s password during the authentication phase in a network • change of passwords infrequent intervals leaves little room for attackers • enhanced capabilities of password utilization improve the performance of the systems
  • 3. 3 Structure 1. literature review 2. authentication protocols 3. security features of each proposal 4. proposed solution and its main outcomes 5. discussion about challenges and future work 6. conclusions
  • 4. 4 Authentication • Authentication comes from the Greek lemma αὐθεντικός (authentikos) – is confirming the truth of an attribute of a single piece of data claimed to be true by an entity • user identification was introduced to allow the system to identify the user and thus to specify his access privileges
  • 5. 5 Username • should be created using the system-wide character set – should not be separated into discrete words – should meet a specific limit of characters • lower limit is one (1) character as there shouldn’t be a “no one” (from Homer Odyssey) user • systems-specific extend – multiple systems = diverse usernames • username once created cannot be altered
  • 6. 6 Password • to prove user authenticity to the system • the more secure a password is the more difficult it becomes for humans to conceal or even remember it – transmission of the password “over the air” – password codeword is also exposed by its shape – protection of the communication channel – man-in-the-middle attack – secrets change in time
  • 7. 7 Authentication procedure • how one party verifies another's identity • credentials are transmitted over the network • technologies used for security proposal – Lightweight Directory Access Protocol, – Kerberos
  • 8. 8 LDAP • by providing a Domain Name (DN) and a set of credentials, a client can use the bind operation to authenticate itself to the directory • there are different types of bind methods in LDAP – In a simple bind, the user presents a clear-text DN and password to the LDAP server
  • 9. 9 Threats against LDAP • Heartbleed – length of payload greater than the amount of data expected in the HeartbeatRequest message • Session Hijacking – Man-in-the-Middle attack • the harassment of the communication channel imposes severe security threats to the authentication service – the service can be restored while the incident cannot
  • 10. 10 Kerberos • offers a means of validating the identity of individuals on an accessible (unprotected) network • conducts authentication by using standard cryptography – symmetric-key cryptography – public-key cryptography
  • 12. 12 Threats against Kerberos • Rainbow table, given the poor-quality of the user-selected passwords • illegitimate person gains access to the KDC database • Man-In-The-Middle record all data on the wire and even alter the transmitted data selectively • weakness is that the key kC used to encrypt the client's credentials is derived from a password, and passwords are notoriously vulnerable
  • 13. 13 Proposition • Credentials’ current values are deterministic for the authentication though stochastic in time – set of passwords are linked to each username • Username current value may be kept away from the user knowledge • one could identify the credentials set through the identifier of the selected password’s thesis along with the pre-computed list in the secure media – no one except the issuer-authentication service may know the actual value of the identified password
  • 14. 14 Proposition – Smart Card • Secrets precomputed and stored in a secure repository • under the control of the user but not under his authority • valid password is identified through the list number • alteration of the valid password may take effect without the exposure of its value
  • 16. 16 Kerberos oriented implementation 1. Authority Service Request step needs to be changed • smart card’s ID as well as the enlisted password ID AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime, SCidCode, Pid) 2. database scheme at the AS has to transform the password record from a fixed size variable to a fixed size list • objectClass: SCidCodeuserPassword1 • objectClass: SCidCodeuserPassword2 • … 3. turn-based identification mechanism could be utilized when a password has to be changed 4. the passwords may now be selected by the system • the scope of using string2key and namely PBKDF2 mechanisms is raised 5. host machine does not contain a local repository • Ticket Granting Server needs to redirect the ticket’s destination from the machine to the card
  • 17. 17 LDAP oriented implementation 1. smart card ID should be stored in AS repository and linked to the user’s principal name 2. password repository should be changed from the terminal’s file system to the smart card
  • 18. 18 Eliminated Threats • Man in the Middle attack – even by hijacking the session will have no clue of the secret • Dictionary – Brute force attacks – there is no fixed length or format of the password • Clone attack – replay legitimate messages to hijack a session is not further handful because of the dynamic change of passwords • Social Engineering – user will not be able to expose something that he/she does not know
  • 19. 19 Related work – Future wok • the majority of current security proposals based on Kerberos protocol are related to the cryptographic aspect • a smart card integration design was proposed – swap the encryption-decryption mechanism from terminal to smart card • the above resolve the issues created by dictionary attacks – remains vulnerable against Brute Force and Man in the Middle attacks • If the smart card is breached, then the secrets are exposed – Future work could focus on securing the authentication process end-to-end
  • 20. 20 Conclusions • proposed solution is implemented alike LDAP and Kerberos. • a leeway of enhancements is presented • changes required in protocols are minimal while the impact is great • authentication procedure is further hardened, freed from known vulnerabilities