Information Security: Authentication
Information Security: Authentication
Information Security: Authentication
Authentication
OTP
Biometrics
Token-based authentication
Server-Client Authentication
Challenge Response Authentication
Authentication in distributed systems (multi service
providers/domains)
Single sign-on, Microsoft Passport
Trusted Intermediaries
Scenario 1
ISP D
ISP B FIT E-learning
Hello FIT, I’m V
ISP C
ISP A
Student V Client
authentication
Scenario 2
ISP D
ISP B FIT E-learning
ISP C
ISP A
Student V Server
authentication
Human Authentication Factors
Basic idea
User has a secret password
System checks password to authenticate user
Issues
How is password stored?
How does system check password?
How easy is it to guess a password?
Difficult to keep password file secret, so best if it is hard
to guess password even if you have the password file
Basic password scheme
To authenticate to a
computer or over a remote
access connection, the user
inserts the smart card into a
suitable reader and enters
the PIN.
The user cannot gain access
with just the PIN, or with just
the smart card.
Token-based Authentication: Smart Card
With embedded CPU and memory
Various forms
PIN protected memory card
Enter PIN to get the password
Cryptographic challenge/response cards
A cryptographic key in memory
Computer create a random challenge
Enter PIN to encrypt/decrypt the challenge w/ the card
Cryptographic Calculator (readerless smart card)
Simulating a smartcard: user enter the encrypted result
What you have: Email/Mobile phone
Client c Server
Login ,IDc
IDc, R
MAC=H(R,K)
IDc, MAC
MAC’=H(R,K)
OK / Disconnect
Compare MAC’ with
MAC
CHAP Examples
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-
ppp-chap.html
Outline
Authentication factors
User authentication
Password authentication, salt
Challenge-Response
Biometrics
Token-based authentication
Server-Client Authentication
Challenge Handshake Authentication (CHAP)
Authentication in distributed systems
Single sign-on: Microsoft Passport
Trusted Intermediaries
Idea of SSO
Example of SSO: Google
How to build SSO?
Outline
User authentication
Password authentication, salt
Challenge-Response
Biometrics
Token-based authentication
Server-Client Authentication
Challenge Handshake Authentication (CHAP)
Authentication in distributed systems
Single sign-on, Microsoft Passport
Trusted Intermediaries
Trusted Intermediaries
KZ-KDC
KA-KDC KB-KDC
Key Distribution Center (KDC)
Q: How does KDC allow Bob, Alice to determine shared
symmetric secret key to communicate with each other?
KDC
generates
KA-KDC(A,B) R1
Bob’s digital
+
public +
signature KB
key KB (encrypt)
CA
certificate for
K-
Bob’s private
identifying key CA Bob’s public key,
information signed by CA
Certification Authorities
When Alice wants Bob’s public key:
gets Bob’s certificate (Bob or elsewhere).
apply CA’s public key to Bob’s certificate, get Bob’s
public key
CA is heart of the X.509 standard used extensively in
SSL (Secure Socket Layer), S/MIME (Secure/Multiple Purpose
Internet Mail Extension), and IP Sec, etc.
+ digital Bob’s
KB signature public
+
(decrypt) KB key
CA
public +
K CA
key
Single KDC/CA
Problems
Single administration trusted by all principals
Single point of failure
Scalability
Solutions: break into multiple domains
Each domain has a trusted administration
Tutorial