Ch15Crypto6e Userauth Nemo2
Ch15Crypto6e Userauth Nemo2
Network Security
Sixth Edition
by William Stallings
Chapter 15
User Authentication
“Badges? We ain’t got no badges! We don’t
need no badges! I don’t have to show you
any stinking badges!”
Verification
• Presenting an step
identifier to the •Presenting or generating
security system authentication information
that corroborates the
binding between the entity
Identification and the identifier
step
Means of User Authentication
Something the individual knows Something the individual possesses
• Examples include a password, a • Examples include cryptographic
personal identification number keys, electronic keycards, smart
(PIN), or answers to a prearranged cards, and physical keys
set of questions • This is referred to as a token
There are four general
means of authenticating a
user’s identity, which can
be used alone or in
combination
Something the individual is Something the individual does
(static biometrics) (dynamic biometrics)
• Examples include recognition by • Examples include recognition by
fingerprint, retina, and face voice pattern, handwriting
characteristics, and typing rhythm
• Timestamps
• Requires that clocks among the various participants be synchronized
• Party A accepts a message as fresh only if the message contains a timestamp
that, in A’s judgment, is close enough to A’s knowledge of current time
• Challenge/response
• Party A, expecting a fresh message from B, first sends B a nonce (challenge)
and requires that the subsequent message (response) received from B contain
the correct nonce value
• Binding – In all cases, cryptographic means must be used to insure that neither
cut-and-paste nor message modification is possible without detection
One-Way Authentication
One application for which
encryption is growing in A second requirement is
popularity is electronic that of authentication
mail (e-mail)
•Header of the e-mail message •The recipient wants some
must be in the clear so that assurance that the message is
the message can be handled from the alleged sender
by the store-and-forward
e-mail protocol, such as SMTP
or X.400
•The e-mail message should be
encrypted such that the mail-
handling system is not in
possession of the decryption
key
Scalable Transparent
• Ticket
• Created once the AS accepts the user as authentic; contains the user’s ID and
network address and the server’s ID
• Encrypted using the secret key shared by the AS and the server
Kerberos
Version 5
Flags
A markup
language that
Enables
uses sets of
applications to
embedded tags An XML-based
request services A set of SOAP
or labels to language for the
from one extensions for
characterize text exchange of
another with implementing
elements within security
XML-based message
a document so information
requests and integrity and
as to indicate between online
receive confidentiality in
their business
responses as Web services
appearance, partners
data formatted
function,
with XML
meaning, or
context
Personal Identity Verification
• User authentication based on the possession of a smart card is
becoming more widespread
• Has the appearance of a credit card
• Has an electronic interface
• May use a variety of authentication protocols