Authentication: Overview: Paul Bui
Authentication: Overview: Paul Bui
Paul Bui
What is authentication?
• Positive verification of identity (man or
machine)
• Verification of a person’s claimed identity
• Who are you? Prove it.
• 3 Categories:
– What you know
– What you have
– Who you are
What you know
• Password
• Passphrase
• PIN
What you have
• Digital authentication
– physical devices to aid authentication
• Common examples:
– eToken
– smart cards
– RFID
eToken
• Can be implemented on a USB key fob or a
smart card
• Data physically protected on the device itself
• On the client side, the token is accessed via
password
• Successful client-side authentication with the
password invokes the token to generate a stored
or generated passcode, which is sent to the
server-side for authentication.
eToken
• May store credentials
such as passwords,
digital signatures and
certificates, and
private keys
• Can offer on-board
authentication and
digital signing
Smart cards
• Size of a credit card
• Usually an embedded microprocessor with
computational and storage capabilities
• Programmable platforms:
– C/C++
– Visual Basic
– Java
– .Net (beta)
Smart Cards cont’d
• Contact vs. contactless
• Memory vs. microprocessor
RFID
• RFID - Radio Frequency IDentification
• Integrated circuit(s) with an antenna that can
respond to an RF signal with identity information
• No power supply necessary—IC uses the RF
signal to power itself
• Susceptible to replay attacks and theft
• Examples:
– Smart Tag, EZPass
– Garage parking permits
RFID
• 13.56Mhz read/write
support
• May communicate
with a variety of
transponders
(ISO15693,
ISO14443 Type A &
B, TagIt, Icode, etc.)
• Reader is controlled
via PCMCIA interface
using an ASCII
protocol
Who you are
• Biometric authentication
– Use of a biometric reading to confirm that a
person is who he/she claims to be
• Biometric reading
– A recording of some physical or behavioral
attribute of a person
Physical Biometrics
• Fingerprint • Smell
• Iris • Thermal Face
• Hand Geometry • Hand Vein
• Finger Geometry • Nail Bed
• Face Geometry • DNA
• Ear Shape • Palm Print
• Retina
Behavioral Biometrics
• Signature
• Voice
• Keystroke
• Gait
Fingerprints
• Vast amount of data available on
fingerprint pattern matching
• Data originally from forensics
• Over 100 years of data to draw on
– Thus far all prints obtained have been unique
Fingerprint Basics
• Global features
– Features that can be seen with the naked eye
– Basic ridge patterns
• Local features
– Minutia points
– Tiny unique characteristics of fingerprint
ridges used for positive identification
Basic Ridge Patterns
• Loop
• 65% of all
fingerprints
• Arch
• Plain and
tented arch
• Whorl
• 30% of all
fingerprints
• One complete
circle
Local Features
• Also known as minutia points
• Used for positive identification
• Two or more individuals may have the
same global features, but different minutia
• Minutia points do not have to be inside the
pattern area
Types of Minutia
• Ridge ending
• Ridge bifurcation
• Ridge divergence
• Dot or island – ridge so short it appears to
be a dot
• Enclosure – ridge separates and then
reunites around an area of ridge-less skin
• Short ridge – bigger than a dot
Minutia Characteristics
• Orientation
– The direction the minutia is facing
• Spatial frequency
– How far apart the ridges are around the point
• Curvature
– Rate of change of orientation
• Position
– X,Y location relative to some fixed points
Algorithms
• Image-based
• Pattern-based
• Minutia-based
Fingerprint Scanners
Biometric
Template
Enrollment Database
Verification
Biometric
Image Processing
Raw Image Sampled Algorithm
Biometric Scanner (Enrollment
Data Image Data (Enrollment
Computer)
Computer)
Enrollment Database
Motivation
• Real-world considerations:
– What you know and what you have
• Can be stolen or forgotten
• Susceptible to replay attacks
– Who you are
• Unique biometrics that hinder replay attacks and
imposters
• Privacy issues arise
Authentication Token Formats
• A security token (authentication token) is a
representation of security-related data (not
to be confused with an e-Token)
• Examples:
– X.509 certificates
– Kerberos tickets
– Custom security tokens
X.509 Certificates
• Use of digital certificates issued by a trusted Certificate
Authority (e.g. VeriSign)
• A Digital Certificate contains information to assert an
identity claim
– Name
– Serial number
– Expiration dates
– Certificate holder’s public key (used for encrypting/decrypting
messages and digital signatures)
– Digital signature of Certificate Authority (so recipient knows that
the certificate is valid)
• The recipient may confirm the identity of the sender with
the Certificate Authority
Kerberos Tickets
• Clients share secret symmetric key with server
• Clients login to authentication server
• Server returns a Ticket-Granting Ticket (TGT) encrypted
with client’s key
• Client sends decrypted TGT to Ticket Granting Service
• TGS sends ticket authorizing network access and certain
services
• Session ticket data:
– Name
– Network address
– Time stamp
– Expiration dates
– Session key
Custom Security Tokens
• May contain additional context information:
– Access method
• wired, local terminal
• wired remote terminal
• wireless PDA
– Authentication method
• Password
• e-Token
• Fingerprint
– Trust level
Trust Level Extension
• Different trust levels for devices with
different levels of implementation reliability
• Still very abstract and should be further
developed
– definition
– representation
– storage
– exchange
– verification
– translation across trust domains
Example Authentication (Security)
Token Request
<AuthenticationToken>
<CreatedAt>08/03/2004 8:00:00 AM</CreatedAt>
<ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt>
<Username>Weaver</Username>
<KeyStr>FINGERPRINT_KEY_STRING</KeyStr>
<Technology>Fingerprint</Technology>
</AuthenticationToken>
Example Authentication (Security)
Token Reply
<TrustLevelSecToken>
<CreatedAt>08/03/2004 8:00:00 AM</CreatedAt>
<ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt>
<UserID>5323</UserID>
<TrustLevel>Fingerprint</TrustLevel>
<TokenIssuer>http://cs.virginia.edu/TrustSTS.asmx</TokenIssuer>
<TrustAuthority>http://cs.virginia.edu/TrustAuthority.asmx</TrustAuthority>
</TrustLevelSecToken>
Bibliography
• Authentication
– L. O’Gorman, “Comparing Passwords,
Tokens, and Biometrics for User
Authentication,” Proc. IEEE, Vol. 91, No. 12,
Dec. 2003, pp. 2019-2040.
• Kerberos
– http://www.computerworld.com/computerworld
/records/images/pdf/kerberos_chart.pdf