CH03-CompSec4e
CH03-CompSec4e
Principles and
Practice
Fourth Edition, Global Edition
Areas of
risk
Assurance Level
More specifically Four levels of
is defined as: assurance
Describes an
organization’s Level 1
degree of The degree of confidence
• Little or no confidence in the
asserted identity's validity
certainty that a in the vetting process used
to establish the identity of
user has the individual to whom the Level 2
credential was issued
presented a • Some confidence in the asserted
identity’s validity
credential that
refers to his or Level 3
• High confidence in the asserted
her identity The degree of confidence identity's validity
that the individual who uses
the credential is the
individual to whom the Level 4
credential was issued • Very high confidence in the
asserted identity’s validity
Potential Impact
• FIPS 199 defines three levels of potential
impact on organizations or individuals
should there be a breach of security:
o Low
• An authentication error could be expected to have a
limited adverse effect on organizational operations,
organizational assets, or individuals
o Moderate
• An authentication error could be expected to have a
serious adverse effect
o High
• An authentication error could be expected to have a
severe or catastrophic adverse effect
Table
3.2
Exploiting
Specific Popular password Exploiting user
multiple
account attack attack mistakes
password use
UNIX Implementation
•Original scheme
•Up to eight printable characters in length
•12-bit salt used to modify DES encryption into a one-way hash function
•Zero value repeatedly encrypted 25 times
•Output translated to 11 character sequence
•Now regarded as inadequate
•Still often required for compatibility with existing account management
software or multivendor environments
Improved
Implementations
• Dictionary attacks
• Develop a large dictionary of possible passwords and try each against the
password file
• Each password must be hashed using each salt value and then compared to
stored hash values
• Rainbow table attacks
• Pre-compute tables of hash values for all salts
• A mammoth table of hash values
• Can be countered by using a sufficiently large salt value and a sufficiently large
hash length
• Password crackers exploit the fact that people choose easily guessable passwords
• Shorter password lengths are also easier to crack
• John the Ripper
• Open-source password cracker first developed in in 1996
• Uses a combination of brute-force and dictionary techniques
Modern Approaches
• Complex password policy
o Forcing users to pick stronger passwords
• Vulnerabilities
• Weakness in the OS that allows access to the file
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Table 3.3
• Electronic interface
o A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
Electronic
Functions
and Data
for
eID Cards
• Ensures that the contactless RF chip in the eID card cannot be read without
explicit access control
• For online applications, access is established by the user entering the 6-digit
PIN (which should only be known to the holder of the card)
• For offline applications, either the MRZ printed on the back of the card or the
six-digit card access number (CAN) printed on the front is used
Biometric
Authentication
• Attempts to authenticate an individual based on
unique physical characteristics
• Based on pattern recognition
• Is technically complex and expensive when
compared to passwords and tokens
• Physical characteristics used include:
o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
Remote User
Authentication
• Authentication over a network, the
Internet, or a communications link is more
complex
• Additional security threats such as:
o Eavesdropping, capturing a password,
replaying an authentication sequence that
has been observed
Study:
ATM
Security
Problems
Summary
• Digital user • Biometric
authentication principles authentication
o A model for digital user
o Physical characteristics used
authentication
o Means of authentication in biometric applications
o Risk assessment for user o Operation of a biometric
authentication authentication system
o Biometric accuracy
• Password-based
authentication • Remote user
o The vulnerability of passwords authentication
o The use of hashed passwords o Password protocol
o Password cracking of user-chosen o Token protocol
passwords o Static biometric protocol
o Password file access control
o Dynamic biometric protocol
o Password selection strategies