08 Entity Authentication14
08 Entity Authentication14
Entity Authentication
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
14.1
Chapter 14
Objectives
To distinguish between message authentication and
entity authentication
To define witnesses used for identification
To discuss some methods of entity authentication
using a password
To introduce some challenge-response protocols for
entity authentication
To introduce some zero-knowledge protocols for
entity authentication
To define biometrics and distinguish between
physiological and behavioral techniques
14.2
14-1 INTRODUCTION
14.4
14.1.2 Verification Categories
Something known
Something possessed
Something inherent
14.5
14.1.3 Entity Authentication and Key
Management
14.6
14-2 PASSWORDS
14.7
14.2.1 Fixed Password
Stealing a password
guessing
14.8
14.2.1 Continued
Dictionary attack
Create a list of password, calculate the hash value,
and search the second-column entries to find a
match.
14.9
14.2.1 Continued
Fourth Approach
14.11
14.2.2 One-Time Password
14.12
14.2.2 Continued
Figure 14.4 the third approach -- Lamport one-time password
14.13
14-3 CHALLENGE-RESPONSE
Note
In challenge-response authentication, the claimant
proves that she knows a secret without sending it to
the verifier.
Note
The challenge is a time-varying value sent by the
verifier; the response is the result
of a function applied on the challenge.
14.15
14.3.1 Using a Symmetric-Key Cipher
First Approach Figure 14.5 Nonce challenge
1. ID of claimant
2. The challenge: RB is the nonce randomly chosen by the Bob to
challenge Alice
3. Alice encrypts the nonce using the shared secret key known only
to Alice and Bob. Bob decrypts the message. If the nonce
14.16 obtained from decryption is the same as the one sent by Bob.
14.3.1 Continued
Figure 14.6 Timestamp challenge
Second Approach
1. Alice ID
2. The challenge from Bob to Alice RB
3. Alice respond and send her challenge RA
4. Bob’s response. RA and RB are switched to prevent a replay attack.
14.18
14.3.2 Using Keyed-Hash Functions
Second Approach
Figure 14.10 Bidirectional, asymmetric-key
14.21
14.3.4 Using Digital Signature
14.23
14-4 ZERO-KNOWLEDGE
14.24
14.4.1 Fiat-Shamir Protocol
Figure 14.13 Fiat-Shamir protocol
y 2 (rs c ) 2 r 2 s 2c r 2 (s 2 )c xvc
14.25
14.4.1 Continued
Cave Example Figure 14.14 Cave example
1. Alice chooses to go either right or left. After Alice disappears, Bob comes to
point 2 and asks Alice to come up from either the right or left.
2. if Alice knows the magic word, she will come up from the right direction. If
she does not know the word, she comes up from the right direction with ½
probability.
3. The game will be repeated many times.
14.26
14.4.2 Feige-Fiat-Shamir Protocol
Figure 14.15 Feige-Fiat-Shamir protocol
y 2 v1 1 v2 2 vk k r 2 ( s1 1 ) 2 ( s2 2 ) 2 ( sk k ) 2 v1 1 v2 2 vk
c c c c c c c c ck
x( s1 v1 ) c1 ( s2 v2 ) c2 ( sk vk ) ck
2 2 2
14.27
14.4.3 Guillou-Quisquater Protocol
Figure 14.16 Guillou-Quisquater protocol
y e v c (r s c )e v c r e s ce v c
r e ( s e v)c x 1c x
14.28
14-5 BIOMETRICS
14.30
14.5.2 Enrollment
14.31
14.5.3 Authentication
Verification
Identification
14.32
14.5.4 Techniques
14.33