CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability...

19
CSC 386 – Computer Security Scott Heggen

Transcript of CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability...

Page 1: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

CSC 386 – Computer Security

Scott Heggen

Page 2: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Page 3: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Agenda

• Authentication• Passwords• Reducing the probability of a password

being guessed• Reducing the probability of someone

learning your password from the user• Reducing the probability of someone

learning your password from the system

Page 4: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

What About the System?

• Where are usernames and passwords stored?• An attacker could try to compromise the confidentiality or integrity of

this file

• Countermeasures:• cryptographic protection,• access control enforced by the operating system,• combination of cryptographic protection and access control, possibly with

further measures to slow down dictionary attacks.

Page 5: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

One-way Functions

• For cryptographic protection we can use one-way functions (cryptographic hash functions).

• Definition: A one-way function f is a function that is relatively easy to compute but hard to reverse.

• Given an input x it is easy to compute f(x), but given an output y it is hard to find x so that y = f(x)

• Instead of the password x, the value f(x) is stored in the password file; when a user logs in entering a password x’, the system applies the one-way function f and compares f(x’) with the expected value f(x).

Page 6: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Peruvian Coin Flip

• User creates a password• User runs the password through some

arbitrarily complex math function• User shares result with system

Page 7: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Page 8: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Access Control Settings

• Who should be able to write to a password file?

• Who should be able to read from a password file?

Page 9: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Caching

• When navigating through a website, why don’t you need to log in on every page load?

• Passwords are sometimes stored locally to retain a “session”

• This password can remain in the cache for long periods of time

Page 10: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Single Sign-on

• At Berea, how many systems do you sign into?

• How many username/password combinations do you have for all these systems?

• What’s wrong with this “feature”?

Page 11: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Other Forms of Authentication

• What other ways can we authenticate a user?

• Based on:• Something you know

• Something you have

• Something you are

Page 12: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Something You Know• The user has to know some secret to be authenticated.• Examples: password, personal identification number (PIN), personal

information like home address, date of birth, name of spouse (used e.g. by banks to authenticate customers on the phone).

• Anybody who obtains your secret “is you”. • You leave no trace if you pass your secret to somebody else. • There is a case of computer misuse where somebody has logged in

using your username and password.• Can you prove your innocence? • Can you prove that you have not divulged your password?

Page 13: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Something You Have

• User presents a physical token to be authenticated. • Examples: keys, cards or identity tags (access to buildings), smart cards.• Physical tokens can be lost or stolen. • Anybody who is in possession of the token has the same rights as the legitimate

owner.• To increase security, physical tokens are often used in combination with

something you know, e.g. bank cards come with a PIN or with a photo of the user.

Page 14: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Something You Are

• Biometric schemes use unique physical characteristics (traits, features) of a person such as face, finger prints, iris patterns, hand geometry (maybe even DNA at some time in the future).

• Biometrics may seem to offer the most secure solution for authenticating a person.

• Biometric schemes are still quite new; it has to be seen whether results from experiments conducted in controlled environments are a good indicator for practical performance.

Page 15: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Failure Rates

• New issue: false positives and false negatives• Accept wrong user (false positive): security problem. • Reject legitimate user (false negative): creates embarrassment and an

inefficient work environment.

Page 16: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Technology Analysis

• Based on a (given) databases of biometric samples. • Measures performance of the algorithms extracting and

comparing biometric features. • False match rate (FMR):

• False non-match rate (FNMR):

matches false attempted ofnumber matches false successful ofnumber FMR

matches genuine attempted ofnumber matches genuine rejected ofnumber FNMR

Page 17: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Finding the Right Balance

FMR FNMR

0 1Matching Threshold (in %)

EER0%

10%

20%

30%

(Equal error rate)

Page 18: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

New Stuff in Authentication

• Two-factor• Gesture Authentication• Picture-Gesture Authentication• Keystroke Cops• Voice• RFID Tags

Page 19: CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.

Summary

• Authentication is not about guaranteeing a person’s identity is correct• Authentication is about maximizing the probability that a person’s

identity is correct • …or alternatively, minimizing the probability that a person’s identity is

forged• Must balance the probability that a failure allows wrongful access

against the probability that a failure denies rightful access