Ch3-Key Distribution and User Authentication
Ch3-Key Distribution and User Authentication
User Authentication
2
Chapter 14 Overview
Learning Objectives
User Authentication
Potential
impact
Areas of
risk
Assurance Level
Describes an More Four levels
organization’ specifically is of
s degree of defined as: assurance
certainty that
a user has Level 1
• Little or no confidence in
identity
Level 3
• High confidence in the
asserted identity's validity
The degree of
confidence that the
individual who uses
the credential is the
Level 4
individual to whom the
• Very high confidence in the
credential was issued
asserted identity’s validity
Potential Impact
• FIPS 199 defines three levels of potential
impact on organizations or individuals should
there be a breach of security:
Low
• An authentication error could be expected to have a
limited adverse effect on organizational operations,
organizational assets, or individuals
Moderate
• An authentication error could be expected to have a
serious adverse effect
High
• An authentication error could be expected to have a
severe or catastrophic adverse effect
13
Risk Assessment For User
Authentication
Mod/
Personal safety None None Low
High
Password Authentication
Password Vulnerabilities
• It is worthwhile to study/re-
search password and password
vulnerabilities
Most common
Still the most efficient
18
UNIX Implementation
• Original scheme
8 character password form 56-bit
key
12-bit salt used to modify DES
encryption into a one-way hash
function
output translated to 11 character
sequence
• Now regarded as woefully inse-
cure
e.g. supercomputer, 50 million
tests, 80 min
21
Improved Implementations
Password Cracking
• Dictionary attacks
try each word then obvious variants in
large dictionary against hash in password
file
• Rainbow table attacks
a large dictionary of possible passwords
for each password:
• precompute tables of hash values for all salts
• a mammoth table of hash values: e.g. 1.4GB
table cracks 99.9% of alphanumeric Windows
passwords in 13.8 secs
not feasible if larger salt values used
23
Password Choices/Concerns
Token-based Authentication
Memory Card
Smartcard
• credit-card like
• has own processor, memory, I/O ports
ROM, EEPROM, RAM memory
• executes protocol to authenticate with reader/com-
puter
static: similar to memory cards
dynamic: passwords created every minute;
entered manually by user or electronically
challenge-response: computer creates a
random number; smart card provides its
hash (similar to PK)
• also have USB dongles
31
Biometric Authentication
Operation of a
biometric
system
Verification is analogous to
user login via a smart card
and a PIN
Biometric Accuracy
Biometric Accuracy
• Similar approach
for token and
biometric
verification
39
Practical Application
46
Summary