Chapter 5 - User Authentication(1)
Chapter 5 - User Authentication(1)
Authentication
• The process of verifying an identity claimed by or for
a system entity.
• The authentication process consists of two steps:
o Identification step: Presenting an identifier to the security system.
• (Identifiers should be assigned carefully, because authenticated
identities are the basis for other security services, such as access
control services.)
o Verification step: Presenting or generating authentication information that
corroborates the binding between the entity and the identifier.
• Example:
o user Alice could have the user identifier ALICE123 which is stored in a
database or any computer.
o A typical item of authentication information associated with this user ID is
a password, which is kept secret.
o The combination of Alice’s user ID and password authenticates Alice.
NIST SP 800-63-3 (Digital Authentication
Guideline, October 2016) defines digital user
authentication as:
2 Authentication Factors b Provide ongoing training for users on best practices for password
management and recognizing phishing attempts to enhance overall
3 Credential Protection security awareness.
1
4 Identifiers reuse c If using biometrics, ensure the security of biometric data storage and
2 processing to prevent unauthorized access.
5 Logging and
Monitoring 3 d Prevent reuse of identifiers for a defined period
E-Authentication using
Token and Credential
• Password, PIN,
answers to • Smartcard, • Fingerprint,
prearranged electronic retina, face
questions • Voice pattern,
keycard, handwriting,
physical key typing rhythm
Risk Assessment for
User Authentication
Assurance
• There are
three Level
separate
concepts: Potential
impact
Areas of
risk
More specifically Four levels of
is defined as: assurance
Describes an
organization’s Level 1
The degree of confidence
degree of in the vetting process
•Little or no confidence in the
asserted identity's validity
used to establish the
certainty that a identity of the individual
to whom the credential Level 2
user has was issued •Some confidence in the asserted
presented a
identity’s validity
•
slow hash Load •
function •
Password File
Salt
Select Password
slow hash
function
Hashed password
Compare
(b) Verifying a password
40%
The graph shows the
Percent guessed
percentage 30%
of passwords that have
been recovered as a 20%
In this section, we examine two types of tokens that are widely used.
Memory Cards
• Can store but do not process data
• The most common is the magnetic stripe card
• Can include an internal electronic memory
• Can be used alone for physical access
o Hotel room
o ATM
• Provides significantly greater security when combined
with a password or PIN
• Drawbacks of memory cards include:
o Requires a special reader
o Loss of token
o User dissatisfaction
Smart Tokens
• A wide variety of devices qualify as smart tokens. These can be categorized
along four dimensions that are not mutually exclusive:
• Physical characteristics:
o Include an embedded microprocessor
o A smart token that looks like a bank card
o Can look like calculators, keys, small portable objects
• User interface:
o Manual interfaces include a keypad and display for human/token interaction
• Electronic interface
o A smart card or other token requires an electronic interface to communicate with a
compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o The purpose of a smart token is to provide a means for user
authentication.
o We can classify the authentication protocols used with smart tokens
into three categories:
• Static: User authenticates to token and then token authenticates the user to computer.
• Dynamic password generator: Periodically generates unique password.
• Challenge-response: computer generates a challenges and smart token generates
response.
Smart Cards
• These are physical cards with embedded chips that
provide secure access when inserted into a card reader.
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Biometric Authentication
Biometric Authentication
• Attempts to authenticate an individual based on
unique physical characteristics
• Based on pattern recognition
• Is technically complex and expensive when
compared to passwords and tokens
• Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Biometric Authentication
Enrollment
• The user presents a name and, typically, some type of password or PIN to the
system.
• The system senses some biometric characteristics of this user (e.g., fingerprint of
right index finger).
• The system digitizes the input and then extracts a set of features that can be
stored as a number or set of numbers representing this unique biometric
characteristic; This set of numbers is referred to as the user’s template.
The user is now enrolled in the system, which maintains for the user a
name (ID), perhaps a PIN or password, and the biometric value.
Biometric Authentication
Verification
• Verification is analogous to a user logging on to a system by using a
memory card or smart card coupled with a password or PIN.
• The user enters a PIN and also uses a biometric sensor. The system
extracts the corresponding feature and compares that to the
template stored for this user.
• If there is a match, then the system authenticates this user.
Authentication over the
Networks
Remote User Authentication
• Authentication over a network, the Internet,
or a communications link is more complex
• Additional security threats such as:
o Eavesdropping, capturing a password,
replaying an authentication sequence that has
been observed