Password Authentication Today
Transcript of Password Authentication Today
-
8/6/2019 Password Authentication Today
1/22
Password AuthenticationSchemes with Smart Cards
Wen-Her Yang and Shiuh-Pyng Shieh
Department of Computer Science
and Information Engineering, Collegeof Electrical Engineering
National Chiao Tung University, Hsinchu, Taiwan 30010
-
8/6/2019 Password Authentication Today
2/22
Introduction
In this paper, two password authentication
schemes with smart cards are proposed.
In the schemes, users can change their
passwords freely, and the remote system does
not need the directory of passwords or
verification tables to authenticate users.
-
8/6/2019 Password Authentication Today
3/22
Introduction
Once the secure network environment is set
up, authentication can be handled solely by
the two parties involved.
For a network without synchronized clocks,
the proposed nonce-based authentication
scheme is able to prevent malicious reply
attacks.
-
8/6/2019 Password Authentication Today
4/22
SecrecyandAuthentication
There are two basic requirements for network security:
SecrecyandAuthentication.
Secrecyprotects sensitive data against eavesdroppingand modification.
Authentication prevents forgery and unauthorized
network access. The common approach to provide
authenticity is the use of passwords (easy use andimplementation)
-
8/6/2019 Password Authentication Today
5/22
conventional password authentication
schemes:
user has an identifier (ID).
User has a secret password (PW).
If a user requests to enter a network system,
he must enter his ID and PW to pass the system
authentication.
-
8/6/2019 Password Authentication Today
6/22
Verification approaches
Directly store and maintain a directory of usersIDS and PWs in the network system.
Upon receipt of a users login request, thenetwork system searches the password directorytable to verify matches.
If they match, the user is regarded as anauthorized user and is permitted to enter thesystem
-
8/6/2019 Password Authentication Today
7/22
Verification approach-continue
Since the password is stored in plain-text form,this approach is clearly under the threat ofrevealing the password.
Many schemes often hash the password witha one way function and store the hash value,
instead of the plain password, in the directorytable.
-
8/6/2019 Password Authentication Today
8/22
Verification approach-continue 2
thus secrecy of passwords can be ensured
even if contents of the directory table aredisclosed.
But the system must protect the directory
table against intruders modification.
Otherwise, the directory table may be
replaced and users may be masqueraded.
-
8/6/2019 Password Authentication Today
9/22
Verification Approach-3
Several authentication protocols use a trustedthird party to ensure authentication andsecurity in an open network system, here
secret information, such as secret keys, mustbe stored in a directory table on theauthentication server.
Therefore, the attacks to the directory tablestill exist in these authentication systems.
-
8/6/2019 Password Authentication Today
10/22
Password Authentication Schemes
with Smart Cards
These schemes all adopt the concept of ID-based
signature scheme Password in conjunction with
smart cards. They have 3 advantages;
(1) Neither secret nor public keys need be exchanged,
(2) The public key directory table is not needed
(3) The assistance of a third party is not needed.
-
8/6/2019 Password Authentication Today
11/22
The first IDbased
signature scheme
used the well-known public-key encryption
algorithm RSA [Rivest78] with smart cards to
implement ID-based signature.
scheme enables communicating parties to
verify each others signature without
exchanging private or public keys.
-
8/6/2019 Password Authentication Today
12/22
ID-based scheme continued
secret key corresponding to an ID is fixed, andcannot be changed thus, a user with anassigned ID cannot choose his secret key by
himself. timestamps concept not employed, the
scheme is weak against the attack of replayingpreviously intercepted signature. (It is hencenot suitable for user authentication innetwork systems).
-
8/6/2019 Password Authentication Today
13/22
Chang and Wus scheme [Chang91]
A users password is generated by thepassword generation center, rather than bythe user himself.
However, users habit is to choose their ownpasswords. This approach is against usershabit and may not be accepted by many users.
Furthermore, the scheme suffers from thethreat of password leakage [Chang93].
-
8/6/2019 Password Authentication Today
14/22
Continued
Based on Elgamals signature [Elgama185] and Shamirs ID-based schemes, Wang and Chang include the concept oftimestamps in an improved authentication scheme[Wang96].
In the their scheme, however, replay attacks cannot beavoided completely and users identities may be forged. Alegitimate user can impersonate other users and pass thesystem authentication.
That is because the information about user identities is notincluded in the verification procedure of their scheme
-
8/6/2019 Password Authentication Today
15/22
continued
The remote system can only determine validity ofthe authentication message, but cannot identifywho really sent this message.
These schemes are all based on ID-basedschemes, they share the problem that a usercannot change his password after registration.
If a users password is compromised, they can nolonger use his current ID, but needs to apply for anew one.
-
8/6/2019 Password Authentication Today
16/22
Prepositions
Researchers proposed two new password authentication schemeswith smart cards.
The proposed schemes can resolve the security problems in theabove schemes.
Their method keeps the merits of ID-based schemes, buteliminates the weakness that users cannot change their passwords.
In the new schemes, a user can freely
choose and change his password at will without re-registering for anew ID.
-
8/6/2019 Password Authentication Today
17/22
Timestamp-Based Password
Authentication Scheme
In the proposed scheme, we assume the
existence of a trusted key information center
in the network to issue personalized smart
cards to users when joining the system.
The proposed timestamp-based password
authentication scheme can be divided into three
phases.
-
8/6/2019 Password Authentication Today
18/22
Timestamp-Based Password
Authentication Scheme
Registration Phase
the key information center sets up the authentication system andissues smart cards to the users who request registration.
login Phase ,
a user attaches his smart card to a terminal and keys in his identifier(ID) and password (PW). Then the terminal sends a login requestmessage to the remote host.
Verification Phase
the remote host verifies the correctness of submitted message and
determines whether the login request should be accepted or not.
-
8/6/2019 Password Authentication Today
19/22
Comparison to other schemes
Scheme allows users to freely change their
password, by submitting their card and newly
chosen password to the KIC over a secure
channel.
Critique
This manually done? Time it takes?
-
8/6/2019 Password Authentication Today
20/22
comparison
Can with stand problems found in other
schemes.
With time stamp T, attack of replayingpreviously intercepted messages is avoided.
Note that if system clocks are not well
synchronized, and transmission delay is long,
potential replay attack is possible, hence
another proposed scheme
-
8/6/2019 Password Authentication Today
21/22
Nonce based authentication scheme
Extended version of the time stamp basedscheme, T is replaced with N, to withstand thereplay attack..
Registration phase is the same
Login phase-after smart card sends messagewith ID and CID to request for login session,
remote host must verify validity of the 2 andevaluates a session nonce N if valid.
This is kept for future use..
-
8/6/2019 Password Authentication Today
22/22
critique
Why not use both nonce and Time stamp?
What if there is failure at generating therandom numbers?, entire system fails..
How to cope with this?
Must system check already generatednumbers?? Or once generated, will not be
used again, ever??