0% found this document useful (0 votes)
180 views66 pages

Authentication & Password Security

This document discusses authentication and account management in information security. It describes different types of authentication credentials like passwords and defines weak passwords. It explains common password attacks like brute force, dictionary, and hybrid attacks. It also summarizes defenses against password attacks such as implementing strong password complexity policies, using credential management applications, and employing password hashing algorithms with salts.

Uploaded by

marya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
180 views66 pages

Authentication & Password Security

This document discusses authentication and account management in information security. It describes different types of authentication credentials like passwords and defines weak passwords. It explains common password attacks like brute force, dictionary, and hybrid attacks. It also summarizes defenses against password attacks such as implementing strong password complexity policies, using credential management applications, and employing password hashing algorithms with salts.

Uploaded by

marya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

ITIS 412: Information Security

Chapter 12: Authentication &


Account Management
Objectives
 Describe the different types of authentication
credentials
 Explain what single sign-on can do
 List the account management procedures for securing
passwords

2 ITIS 412
Introduction
 Authentication - Process of ensuring person desiring
to access resources is authentic (genuine) and not an
imposter
 Authentication - Proof of validity
 Because only real (“authentic”) person possesses one or more
of elements they confirm identity and can be used to prevent
access by imposter
 Authentication factors - Four elements can be
presented to IT system to verify genuineness of the
user
 all credentials can be classified into one of these five
categories
3 ITIS 412
Elements of Authentication
 Can demonstrate to be genuine or authentic by:
 What you have (Example: key fob to lock your car)
 What you are (Example: facial characteristics
recognized by health club attendant)
 What you know (Example: combination to health
club locker)
 Where you are (Example: on a restricted military
base)
 What you do (Example: record number of pushups)

4 ITIS 412
What You Know: Passwords
 User logging in to system:
 Asked to identify himself with username as
identifier
 Asked to authenticate himself with password as
secret combination of letters, numbers, and/or
characters that only user should have knowledge of
 Passwords most common type of authentication today
 Yet passwords provide only weak protection

5 ITIS 412
Passwords Weaknesses
 Most effective passwords are long and complex but
difficult for users to memorize and then accurately
recall when needed
 Users must remember passwords for many different
accounts
 Each account password should be unique
 Many security policies mandate that passwords expire
after set period of time, forcing users to repeatedly
memorize new passwords

6 ITIS 412
Weak Passwords
 Weak password - Passwords that use:
 Common word as password (princess)
 Short password (desk)
 Predictable sequence of characters (abc123)
 Personal information (Hannah)

7 ITIS 412
Predictable Patterns
 To create stronger passwords users often follow predictable
patterns:
 Appending - Combine letters, numbers, and punctuation
(character sets) by appending one character set with
another so add number after letters (caitlin1 or cheer99)
or add character sets in sequence
letters+punctuation+number (amanda.7)
 Replacing - Zero used instead of letter o (passw0rd), digit
1 for letter i (denn1s), or dollar sign for s (be$tfriend)
 Attackers are aware of these patterns in passwords and can
search for them
8 ITIS 412
Password Reuse
 Common shortcut the same password for multiple
accounts
 Makes easier for an attacker who compromises one
account to access other accounts
 Analysis of one theft of 32 million user passwords:
 30 % of users had created passwords of only five or
six characters
 12 % of the user passwords were nine characters in
length
 One in every five users created password that was
one of the 5000 most common passwords
9 ITIS 412
Ten Most Common Passwords

10 ITIS 412
Attacks on Passwords
 Social engineering - Phishing, shoulder surfing,
dumpster diving
 Capturing - Keylogger, protocol analyzer, Man-in-the-
middle and replay attacks
 Resetting - Attacker gains physical access to computer
and resets password

11 ITIS 412
Offline Cracking
 Offline cracking - Method used by most password
attacks today
 One-way hash algorithm creates a unique digital
fingerprint digest when password first created
 When user logs in digest is created from entered
password and compared to stored digest
 With offline cracking attackers steal password digests,
load file onto own computers, and attempt to discover
passwords by comparing stolen digests with their own
created digests (candidates)

12 ITIS 412
Brute Force
 Brute force attack - Every possible combination of
letters, numbers, and characters is used to create
candidate digests then matched against those in stolen
digest file
 Automated brute force attack program parameters:
 Password length: eg. 1-15
 Character set
 Language
 Pattern: ? Replaces 1 symbol, * replaces multiple
 Skips: skip nonsensical combinations

13 ITIS 412
Dictionary Attack
 Dictionary attack - Attacker creating digests of
common dictionary words as candidates
 Pre-image attack - Dictionary attack that uses set of
dictionary words and compares it with stolen digests
when one known digest (dictionary word) compared
to an unknown digest (stolen digest)
 Birthday attack - Search is for any two digests that
are identical

14 ITIS 412
Dictionary Attack

15 ITIS 412
Hybrid Attack
 Hybrid attack - Variation of dictionary attack
 Combines dictionary attack with brute force attack
 Slightly alter dictionary words by:
 Adding numbers to the end of the password
 Spelling words backward
 Slightly misspelling words
 Including special characters (@,$,!, or %)

16 ITIS 412
Rainbow Tables
 Rainbow tables - Creating a large pregenerated data
set of candidate digests
 Generating a rainbow table requires a significant
amount of time
 Once created has significant advantages:
 Can be used repeatedly for attacks on other
passwords
 Rainbow tables are much faster than dictionary
attacks
 Amount of memory needed on attacking machine is
greatly reduced
17 ITIS 412
Password Collections
 Stolen passwords now posted on Internet provide key
elements for password attacks:
 Large amount of real-world passwords available;
because users repeat passwords on multiple
accounts, attackers now use these passwords as
candidate passwords in their attacks
 Password collections provided attackers insight into
strategic thinking of how users create passwords

18 ITIS 412
Password Defenses
 Four primary defenses against password attacks:
 Password complexity
 Credential management
 Password hashing algorithms
 Salts

19 ITIS 412
Password Complexity
 General observations regarding creating passwords:
 Do not use passwords that consist of dictionary
words or phonetic words
 Do not repeat characters (xxx) or use sequences
(abc, 123, qwerty)
 Do not use birthdays, family member names, pet
names, addresses, or any personal information
 Do not use short passwords; strong password should
be minimum of 15 characters in length

20 ITIS 412
Password Length
 Longer password is always more secure than a shorter
password
 Longer passwords require more attempts an attacker
must make in order to break it
 Number-of-Keyboard-Keys ^ Password-Length =
Total-Number-of-Possible-Passwords

21 ITIS 412
Number of Possible Passwords

22 ITIS 412
Nonkeyboard Characters
 Use nonkeyboard characters, or special characters that do
not appear on keyboard
 Characters are created by holding down ALT key while
simultaneously typing number on numeric keypad (but not
numbers across the top of keyboard)
 ALT + 0163 produces £ symbol

23 ITIS 412
Credential Management: Theft Prevention
 Must properly manage password credentials
 Defenses against the theft of password digests:
 Do not leave computer running unattended, even if
in locked office; all screensavers should be set to
resume only when password is entered
 Do not set a computer to boot from optical drive or
USB flash drive
 Password-protect ROM BIOS
 Physically lock computer case so that cannot be
opened

24 ITIS 412
Credential Management: Good Techniques
 Change passwords frequently
 Do not reuse old passwords
 Never write password down
 Have unique password for each account
 Do not allow computer to automatically sign into
account or record a password so login not necessary
 Do not enter passwords on public access computers or
while using an unencrypted wireless network

25 ITIS 412
Password Management Applications
 Secure solution to credential management is rely on
technology rather than human memory to store and
manage passwords
 Password management applications - Programs user
can create and store multiple strong passwords in
single user “vault” file protected by one strong master
password
 Users can retrieve individual passwords as needed by
opening user file, thus freeing user from need to
memorize multiple passwords
 Applications have multiple additional features

26 ITIS 412
Windows Password Hashing Algorithms
 Microsoft Windows operating systems hash
passwords in two ways:
 LM (LAN Manager) hash - Instead of encrypting
password with another key, password itself is key;
LM hash considered very weak function
 Not case sensitive
 Splits password into 2 parts 7 character long
 NTLM (New Technology LAN Manager) hash
 More secure password hash algorithm-HMAC
with md5
 Case sensitive- larger character set
27 ITIS 412
Key Stretching
 Key stretching - Specialized password hash
algorithms intentionally designed be slower to limit
ability of attacker to crack passwords because requires
significantly more time to create each candidate digest
 Two popular key stretching password hash algorithms
are bcrypt and PBKDF2
 Network administrator can specify number of
iterations (rounds), which sets how “expensive” (in
terms of computer time and/or resources) password
hash function is

28 ITIS 412
What is Digest authentication?

 Digest access authentication is one of the agreed-upon


methods a web server can use to negotiate credentials,
such as username or password, with a user's web browser.
 It applies a hash function to the username and password before
sending them over the network.
Enhanced hashed password using Salts
 Salt - Random string used in password hash
algorithms
 Passwords can be protected by adding random string
to user’s cleartext password before hashed
 Salt advantages:
 Make dictionary attacks and brute force attacks for
cracking large number of passwords much slower
 Limit impact of rainbow tables

30 ITIS 412
Enhanced hashed
passwords
using salt
Using
CRC32
In cryptography,
Hash Functions
a salt is random
data that is used
as an additional
input to a one-
way function that
"hashes" data, a
password or
passphrase.
What You Have: Tokens, Cards, and Cell
Phones
 Another type of authentication credential based on
approved user having specific item in possession
 Multifactor authentication - Using more than one
type of authentication credential
 Single-factor authentication - Using one type of
authentication credential
 Common items used for authentication:
 Tokens
 Cards
 Cell phones

32 ITIS 412
Tokens
 Token - Typically small device (usually one that can
be affixed to keychain) with window display
 Instead of user presenting password (what she
knows), token introduces different form of
authentication based on what person has (a token)
 One-time password (OTP) - Authentication code
that can be used only once or for limited period of
time

33 ITIS 412
Token Authentication
 A security token (sometimes called an authentication
token) is a small hardware device that the owner carries to
authorize access to a network service.
 The device may be in the form of a smart card or may be
embedded in a commonly used object such as a key chain

 Owner carries to authorize access to a network service.

34 ITIS 412
Token Authentication Process
card or may be embedded in a commonly used object such as a key fob.

35 ITIS 412
Time-based One-time Password (TOTP)
 Time-based one-time password (TOTP) - Changes
after set time period
 Token and corresponding authentication server share
an algorithm (each user’s token has a different
algorithm)
 The token generates code from algorithm once every
30 to 60 seconds and valid for only brief period of
time
 User enters her username along with code currently
being displayed on token

36 ITIS 412
Time-based One-time Password (TOTP)

 The authentication factors used by the TOTP are:


 Something the user knows: The first authentication factor
requires something the user knows, such as the password for
the user’s single-sign-on user name.

 Something the user has: The second authentication factor


requires something the user has, such as a mobile device
running Google Authenticator to generate time-based one-time
passwords.

 TOTP – Changes after set number of seconds


37 ITIS 412
HMAC-based One-time Password (HOTP)
 HMAC-based one-time password (HOTP) is a one-
time password (OTP) algorithm based on HMAC
(hash-based message authentication code).

 The HOTP Password is “event-driven” and changes


when specific event occurs

 Example: when user enters personal identification


number (PIN) on token’s keypad triggers token to
create random code

38 ITIS 412
Token Advantages
 Standard passwords are static and do not change
unless user forced to create new password
 Tokens produce dynamic passwords that change
frequently
 User might not know if an attacker has stolen her
password
 If token is stolen, become obvious and steps could be
taken immediately to disable account

39 ITIS 412
Cards
 Smart card - Contains integrated circuit chip that can
hold information to be used as part of authentication
process
 Common access card (CAC) - U.S. Department of
Defense (DoD) smart card used for identification of
active-duty and reserve military personnel along with
civilian employees and special contractors
 Personal Identity Verification (PIV) – smart card
standard covering all U.S. government employees

40 ITIS 412
Smart Card Authentication Process

41 ITIS 412
Smart Card

42 ITIS 412
Smart Card Authentication Process

43 ITIS 412
Cell Phones
 Tokens and cards increasingly being replaced today
with cell phones
 Code can be sent to user’s cell phone through an app
on the device or as a text message when using TOTP
 Cell phones also allow user to send request via phone
to receive HOTP authorization code

44 ITIS 412
What You Are: Biometrics
 In addition to authentication based on what person
knows or has, another category rests on features and
characteristics of individual
 “What you are” authentication:
 Standard biometrics
 Cognitive biometrics

45 ITIS 412
Standard Biometrics
 Standard biometrics - Uses person’s unique physical
characteristics for authentication
 Fingerprint scanners most common type
 Face, hand, or eye characteristics also used
 Biometrics commonly used in physical security:
access to secure area restricted to only those who
fingerprint or retina is scanned

46 ITIS 412
Biometric Authentication
Biometric authentication
 Authenticate user based on one of their physical
characteristics:
 facial
 fingerprint
 hand geometry
 retina pattern
 iris
 signature
 voice

Verification is analogous to user login via a smart card and a PIN


Identification is biometric info but no IDs; system compares with
stored templates
Biometric Accuracy
 The system generates a matching score (a number) that quantifies similarity
between the input and the stored template
 Concerns: sensor noise and detection inaccuracy
 Problems of false match/false non-match
How Does Biometrics Work?
Biometric by Characteristic Type

Verification is analogous to user login via a smart card and a PIN


Identification is biometric info but no IDs; system compares with stored templates
Disadvantages of Standard Biometrics
 Cost of hardware scanning devices
 Readers not foolproof
 Reject authorized users
 Accept unauthorized users
 Easily obtainable
 Once compromised cannot be reset

52 ITIS 412
Cognitive Biometrics
 Cognitive biometrics - uses the brain as a biometric
component. So it turns out the way you interact with your
keyboard, and the way you interact
 Related to perception, thought process, and understanding
of user
 Considered to be much easier for user to remember and
more difficult for attacker to imitate
 Examples:
 Picture gesture authentication (PGA) for touch-enabled
devices
 Identify specific faces
 Recall memorable event
53 ITIS 412
What You Do: Behavioral Biometrics
 Behavioral biometrics - Authentication based on
actions that user is uniquely qualified to perform
 Examples
 Keystroke dynamics
 Voice recognition

54 ITIS 412
Keystroke Dynamics
 Keystroke dynamics - Attempts to recognize user’s
typing rhythm
 All users type at different pace
 Provides up to 98 percent accuracy
 Uses two unique typing variables
 Dwell time - Time it takes to press and release a key
 Flight time - Time between keystrokes
 Multiple samples collected to form user typing
template that are used in authentication

55 ITIS 412
Typing Template

56 ITIS 412
Authentication by Keystroke Dynamics

57 ITIS 412
Voice Recognition
 Voice recognition - Several characteristics make each
person’s voice unique
 Voice template can be created
 Difficult for an attacker to authenticate using a
recording of user’s voice
 Phonetic cadence of putting words together is part of
real speech pattern

58 ITIS 412
Where You Are: Geolocation
 Geolocation - Identification of the location of person
or object using technology
 Geolocation may not uniquely identify user but can
indicate if attacker trying to perform malicious action
at location different from normal location
 If computer in China attempts to access user’s bank’s
website this may be an indication that an attacker
 Many websites not allow user to access an account the
computer is located, for example, in North Carolina
when normally access from Tennessee

59 ITIS 412
Single Sign-On
 Identity management - Using single authentication
credential shared across multiple networks
 Federated identity management (FIM) - When
networks are owned by different organizations
 Single sign-on (SSO) – One application of FIM using
one authentication credential to access multiple
accounts or applications
 Holds promise to reduce burden of usernames and
passwords to just one
 Examples popular SSOs: Microsoft Account, OpenID,
and OAuth
60 ITIS 412
Microsoft Account
 Introduced in 1999 as .NET Passport, then name
changed to Microsoft Passport Network, then
Windows Live ID, now Microsoft Account
 Designed as an SSO for Web commerce but today
serves as authentication system for different Microsoft
products
 Authentication process:
 User enters username and password
 User given time limited “global” cookie stored on
computer with encrypted ID tag
 ID tag sent to Web site
61 ITIS 412
OpenID
 OpenID - Decentralized open source FIM
 Does not require specific software to be installed on
the desktop
 URL-based identity system
 OpenID provides a means to prove a user owns the
URL
 One weakness is it depends on URL identifier routing
to correct server, which depends on domain name
server (DNS) that may have its own security
weaknesses

62 ITIS 412
Open Authorization (OAuth)
 Open Authorization (Oauth) - Permits users to share
resources stored on one site with second site without
forwarding authentication credentials
 Allows seamless data sharing among sites
 Relies on token credentials
 Replaces need to transfer user’s username and
password
 Tokens are for specific resources on a site for limited
time period

63 ITIS 412
Account Management
 Managing user account passwords can be done by
setting password rules
 Too cumbersome to manage on a user-by-user basis
 Security risk if one user setting is overlooked
 Preferred approach: assign privileges by group
 Microsoft Windows group password settings:
 Password Policy Settings
 Account Lockout Policy

64 ITIS 412
Password policy settings (Windows Group
Policy)

65 ITIS 412
Account lockout policy settings (Windows
Active Directory)

66 ITIS 412

You might also like