3 Week
3 Week
3 Week
Security
(Securty of Computer Systems)
Prof. Dr. Hasan Hüseyin BALIK
(3rd Week)
Outline
• 2. Computer security technology and
principles
—2.1. Cryptographic Tools
—2.2. User Authentication
—2.3 Access Control
—2.4 Database and Data Center Security
—2.5 Malicious Software
—2.6. Denial-of-Service Attacks
—2.7 Intrusion Detection
—2.8 Firewalls and Intrusion Prevention Systems
2.2. User Authentication
2.2. Outline
• Electronic User Authentication Principles
• Password-Based Authentication
• Token-Based Authentication
• Biometric Authentication
• Remote User Authentication
• Security Issues for User Authentication
Authentication Process
• Fundamental • Identification step
building block ⚫ Presenting an
identifier to the
and primary security system
line of defense
• Verification step
⚫ Presenting or
• Basis for generating
authentication
access control information that
and user corroborates the
binding between
accountability the entity and the
identifier
Table 3.1 I dentification and Authentication Security Requirements ( SP 800-171)
• Password, PIN,
answers to • Smartcard, • Fingerprint,
prearranged electronic retina, face
questions • Voice pattern,
keycard, handwriting,
physical key typing rhythm
Authentication
logic using Authentication
f rst factor logic using
second factor
ol on
ol on
oc t i
oc t i
ot ica
ot ica
pr ent
pr ent
th
th
Au
Au
Pass Pass
Fail Fail
Clie n t Clie n t
Assurance
• There are
three Level
separate
concepts: Potential
impact
Areas of
risk
More specifically Four levels of
is defined as: assurance
Describes an
organization’s Level 1
The degree of confidence
degree of in the vetting process
•Little or no confidence in the
asserted identity's validity
used to establish the
certainty that a identity of the individual
to whom the credential Level 2
user has was issued •Some confidence in the asserted
identity’s validity
presented a
credential that Level 3
•High confidence in the asserted
The degree of confidence
refers to his or her that the individual who
identity's validity
Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
Password
Password File
User ID Salt Hash code
Salt
•
slow hash Load •
function •
Password File
User id
User ID Salt Hash code
Salt
Select Password
slow hash
function
Hashed password
Compare
(b) Verifying a password
Now regarded as
inadequate
• The attack was able to process over 50
million password guesses in about 80
minutes
• Still often required for compatibility with
existing account management software
or multivendor environments
Improved
Implementations
OpenBSD uses Blowfish block
cipher based hash algorithm
called Bcrypt
•Most secure version of Unix hash/salt
scheme
•Uses 128-bit salt to create 192-bit
hash value
•Bcrypt includes a cost variable which
causes a increase in the time required to
Much stronger hash/salt perform a Bcyrpt
schemes available for Unix •hash.
Make
available
only to
Vulnerabilities
privileged
users
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Types of Cards Used as Tokens
Card Type Defining Feature Example
Embossed Raised characters only, on Old credit card
front
Magnetic stripe Magnetic bar on back, characters on front Bank card
Memory Electronic memory inside Prepaid phone card
Smart Electronic memory and processor inside Biometric ID card
Contact Electrical contacts exposed on surface
Contactless Radio antenna embedded inside
Memory Cards
• Can store but do not process data
• The most common is the magnetic stripe card
• Can include an internal electronic memory
• Can be used alone for physical access
o Hotel room
o ATM
• Provides significantly greater security when combined
with a password or PIN
• Drawbacks of memory cards include:
o Requires a special reader
o Loss of token
o User dissatisfaction
Smart Tokens
• Physical characteristics:
o Include an embedded microprocessor
o A smart token that looks like a bank card
o Can look like calculators, keys, small portable objects
• User interface:
o Manual interfaces include a keypad and display
for human/token interaction
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Electronic Identity Cards
(eID)
Use of a smart card as a national Most advanced deployment is the
identity card for citizens German card neuer Personalausweis
Can serve the same purposes as other national Has human-readable data printed on its
ID cards, and similar cards such as a driver’s surface
license, for access to government and •Personal data
commercial services •Document number
•Card access number (CAN)
•Machine readable zone (MRZ)
2. Se
r vice
1. User requests service r equ
3. R est
(e.g., via Web browser) edir
ect t
9. A o eI D
uthe mes
ntica sage
tion
10. S r esul
er vi t for
ce g war
r ant ded
ed
Host/application
server
Biometric Feature
sensor extractor Biometric
database
User interface
(a) Enrollment
Name (PI N)
Biometric Feature
sensor extractor Biometric
database
Biometric Feature
sensor extractor Biometric
database
decision
threshold (t)
imposter profile of
profile genuine user
false
nonmatch false
possible match
possible
in
cr
ea
se
t hr
es
10% ho
ld
false nonmatch rate
in
se crea
de
d c
co ecr ur i sed
cr
ea
nv ea ty,
se
en sed
hrt
ien
es
ce
cr r it d
ho
s e ie
ea y,
dl
in ven
se
co
c
d
n
1%
ne
e li
r at
rr or
al e
equ
0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
false match rate
10%
1%
0.1%
0.0001% 0.001% 0.01% 0.1% 1% 10% 100%
false match rate
P’ P’ W’
r’, return of r password to
f(r’, h(P’))
passcode via token
r’, return of r f(r’, h(W’))
if f(r’, h(P’)) =
f(r, h(P(U))) if f(r’, h(W’)) =
yes/no then yes else no f(r, h(W(U)))
yes/no then yes else no
Client Client
Host Host
U U
U, User U, User
r, random number r, random number
(r, E()) E(), function x, random sequence
challenge
(r, x, E())
B’ BT’ biometric E(), function
D‘ biometric device B’, x’ BS’(x’)
E(r’, D’, BT’) E(r’, BS’(x’))
r’, return of r r’, return of r
E–1E(r’, P’, BT’) = E–1E(r’, BS’(x’)) =
(r’, P’, BT’) (r’, BS’(x’))
if r’ = r AND D’ = D extract B’
AND BT’ = BT(U) from (r’, BS’(x’))
then yes else no if r’ = r AND x’ = x
yes/no
AND B’ = B(U)
yes/no then yes else no
(c) Protocol for static biometric (d) Protocol for dynamic biometric
Attacks Authenticators Examples Typical defenses
Password Guessing, exhaustive Large entropy; limited
search attempts
Token Exhaustive search Large entropy; limited
Client attack attempts, theft of object
requires presence
Biometric False match Large entropy; limited
attempts Some Potential
Password Plaintext theft, Hashing; large entropy;
dictionary/exhaustive
search
protection of password
database
Attacks,
Host attack
Token Passcode theft Same as password; 1-time
passcode
Susceptible
Biometric Template theft Capture device
authentication; challenge
Authenticators,
Password "Shoulder surfing"
response
User diligence to keep
and
secret; administrator
diligence to quickly revoke Typical Defenses
compromised passwords;
multifactor authentication
Eavesdropping,
theft, and Token Theft, counterfeiting Multifactor authentication;
copying hardware tamper resistant/evident
token
Biometric Copying (spoofing) Copy detection at capture
biometric device and capture device
authentication
Password Replay stolen password Challenge-response
response protocol
Token Replay stolen passcode Challenge-response
response protocol; 1-time passcode
Replay
Biometric Replay stolen biometric Copy detection at capture
template response device and capture device
authentication via
challenge-response protocol
Password, token, Installation of rogue Authentication of client or
Trojan horse biometric client or capture device capture device within
trusted security perimeter
Denial of Password, token, Lockout by multiple Multifactor with token
service biometric failed authentications
I ris I ris I ris
scanner scanner scanner
LAN switch
I ris M erge
Remote
I ris
database
Network
switch
Figure 3.14 General I ris Scan Site Architecture for UAE System
I ssuer
(e.g., bank)
I nternet EFT exchange
e.g., Star, VI SA
Processor
(e.g., Fidelity)
I ssuer-owned ATM
Security
I ssuer's EFT exchange
internal network e.g., Star, VI SA
Processor
Problems
(e.g., Fidelity)
I ssuer-owned ATM