2. Authentication (6)
2. Authentication (6)
• The combination of user name and password is one of the most basic and widely
used authentication scheme.
• In this type of authentication user’s credential is checked against credential stored
in a database.
• If the user’s name and password match with the database the user is
authenticated.
• If not, the user is denied access.
• This method may not be very secure as it doesn’t necessarily identify the correct
user.
Token
Slide-8
Message Authentication using MAC
MAC is a technique for message authentication.
❖ A message authentication code (MAC) is a short piece of
information that is appended to the message to be sent
for authentication.
❖ A MAC algorithm accepts a secret key and a message to
be authenticated.
❑ It outputs a MAC, which is sometimes called a tag.
Slide-8
Message Authentication using MAC
This technique assumes that two communicating parties, say Alice and
Bob, share a common secret key KAB. When Alice has a message to send
to Bob, she calculates the message authentication code as a complex
function of the message and the key: MACM = F(KAB, M).
The process of creating MAC value and verifying the integrity of message
is outlined below:
1. Sender generates a message.
2. He/she then creates a “MAC or Tag” of the message using MAC
Sender Site
algorithm (Note that the MAC algorithm accepts two input- a shared
secret key between the communicating parties and the message that
is to be sent).
3. Sender attaches the MAC code to the end of the message that is to be
sent.
4. The sender sends the attached message to the recipient.
5. The sender encrypts the attached message with the recipient’s public
key and sends it to the recipient.
6. After receiving, the recipient decrypts the entire message with his/her
private key.
7. The recipient detaches the message and MAC code.
Receiver Site
7.
8. He/she creates a “digest” of the received message using the same hash
function the sender used.
9. The recipient decrypts the digital signature and finds the “digest” that the
sender created.
10. The recipient then compares the two digests. If they are equal, the
message is granted, otherwise it will be rejected.
Slide-11
Message Authentication using Hash Function
Slide-26
Types of Authentication based on Factors
Two-Factor Authentication (2FA):
A 2FA system strengthens security by requiring the user to
provide dual means of identification from separate
authentication categories- one of which is typically a physical
token, such as a card, and the other of which is typically
something memorized, such as a security code.
❑ An automated teller machine (ATM) typically requires two-factor
verification.
❑ To prove that users are who they claim to be, the system requires two
items: an ATM smartcard and the personal identification number (PIN).
❑ In the case of a lost ATM card, the user's accounts are still safe; anyone
who finds the card cannot withdraw money as they do not know the PIN.
❑ The same is true if the attacker has only knowledge of the PIN and does
not have the card. or a voiceprint.
Slide-27
Types of Authentication based on Factors
Three-factor Authentication (3FA):
3FA adds another factor for further difficulty in falsifying
authentication. Typically a biometric trait measurement is
added for the inherence factor.
❑ Some security procedures now require three-factor
authentication, which involves possession of a physical token and
a password, used in conjunction with biometric data, such as
finger scanning or a voiceprint.
Slide-28
Verification by Something Known: Passwords
The simplest and oldest method of entity authentication is
the password-based authentication, where the password is
something that the claimant knows.
A password is used when a user needs to access a system
to use the system’s resources (login).
❖ User has a secret password
❖ System checks password to authenticate user
Each user of the system has a user identification that is
public, and a password that is private.
Issues:
❖ How is password stored?
❖ How does system check password?
❖ How easy is it to guess a password?
❖ Difficult to keep password file secret, so best if it is hard to
guess password even if you have the password file.
Slide-29
Verification by Something Known: Passwords
Kinds of Password Authentication:
Password authentication can be divided into two schemes:
To access the system resources, the user sends her user ID and password in plaintext
format to the system.
The system uses the user ID to find the corresponding password in the table.
❑ Eavesdropping:
- Eve can watch Alice when she types her password.
❖ Most system do not show the characters a user types.
- Eavesdropping can take a more sophisticated form. Eve can
listen to the line and intercept the message, thereby
capturing the password for her own use.
Slide-33
Possible Attacks on Fixed Passwords
❑ Stealing a Password:
- This occurs when Eve tries to steal Alice’s password
physically.
This can be prevented if Alice does not write down the
password and instead she just commits it to memory.
❖ For this reason, the password should be very simple or else
related to something familiar to Alice.
❖ But this makes the password vulnerable to other types of
attacks.
Slide-34
Possible Attacks on Fixed Passwords
❑ Accessing a Password File:
- Eve can hack into the system and get access to the
ID/password file.
- Eve can read the file and find Alice’s password or even
change it.
- To prevent this type of attack, the file can be read/write
protected.
- However, most systems need this type of file to be
readable by the public.
Slide-35
Possible Attacks on Fixed Passwords
❑ Guessing:
- Using a guessing attack, Eve can log into the system and try
to guess Alice’s password by trying different combinations
of characters.
❖ The password is particularly vulnerable if the user is allowed to
choose a short password.
❖ It is also vulnerable if Alice has chosen something trivial, such as
her birthday, her child’s name, or the name of her favorite
actor.
- To prevent guessing, a long random password is
recommended, something that is not very obvious.
❖ However, the use of such a random password may also create
a problem. Because she could easily forget such a password,
Alice might store a copy of it somewhere, which makes the
password subject to stealing.
Slide-36
Verification by Something Known: Fixed Passwords
Second Approach- Hashing the Password:
In the second approach, the system stores the hash of the password instead of the
plaintext password in the table (a file) that is stored by user identification.
Any user can read the contents of the file, but, because the hash function is a one-way
function, it is almost impossible to guess the value of the password.
When the password is created , the system hashes it and stores the hash in the
password file.
When the user sends her user ID and password, the system creates a hash of the
password and then compare the hash value with the one stored in the file.
In this approach,
the table (file) does
not need to be read
protected.
The ID, the salt, and the hash are then stored in the table (file).
When a user asks for access, the system extracts the salt,
concatenates it with the received password, makes a hash out
of the result, and compares it with the hash stored in the file.
Slide-38
Figure: Salting the password
Verification by Something Known: Fixed Passwords
Fourth Approach- Combination of something known and
something possessed:
Slide-39
Verification by Something Known: One-time Password
First Approach- List of Passwords:
In the first approach, the user and the system agree upon a list of
passwords.
Each password on the list can be used only once.
There are some drawbacks to this approach:
▪ The system and the user must keep a long list of passwords.
▪ If the user does not use the password in sequence, the system needs to
perform a long search to find the match.
Slide-40
Verification by Something Known: One-time Password
Second Approach- Sequentially Updated Password:
Slide-41
Verification by Something Known: One-time Password
Third Approach- Sequentially Updated Password with Hash
Function:
This approach is devised by Leslie Lamport where the user and the system create a
sequentially update the password using a hash function.
In this approach, the user and the system agree upon an original password, P0, and a
counter, n.
The system calculates hn(P0), where hn means applying a hash function n times. In
other words,
The system stores the identity of Alice, the value of n, and the value of hn(P0).
When the system receives the response of the user in the third message, it applies the
hash function to the value received to see if it matches the value stored in the entry. If
there is a match, access is granted; otherwise, it is denied. The system then
decrements the value of n in the entry and replaces the old value of the password
hn(P0) with the new value hn-1(P0).
When the user tries to access the system for the second time, the value of the counter
it receives is n-1. The third message from the user is now hn-2(P0). When the system
receives the message, it applies the hash function to get hn-1(P0), which can be
compared with the updated entry.
Slide-42
Verification by Something Known: One-time Password
Third Approach- Sequentially Updated Password with Hash
Function (continue…):
The value of n in the entry is decremented each time there is an access. When the
value of n becomes 0, the user can no longer access the system; everything must be
set up again. For this reason, the value of n is normally chosen as a large number such
as 1000.
Figure below shows how the user accesses the system for the first time.
Slide-38
What is Biometrics?
3rd Component: Identify an Individual or Verify the Claimed Identity
of an Individual
The last component of the definition categorizes the two types of biometric
functionalities.
1. Identification Systems:
❖ Identification (also called search) occurs when the identity of a
user is priori unknown. In this case the user’s biometric data is
matched against all the records in the database as the user can be
anywhere in the database or he/she actually does not have to be
there at all.
❖ An example of an Identification system using biometrics would be:
You approach an ATM with no card, no claimed identity, no PIN.
The ATM scans your iris and determines who you are and gives
you the access to your money.
2. Verification Systems:
❖ Verification occurs when the user claims to be already enrolled in
the system (presents an ID card or login name); in this case the
verification biometric data obtained from the user is compared to
the user’s data already stored in the database.
❖ An example of a Verification System using biometrics would be:
You approach an ATM and swipe a card or enter an account
number. The ATM scans your iris and uses it as a password to
authenticate you are the rightful owner of the card and therefore
Slide-39
give you access to your money.
Why Biometric Application?/ Advantages
❑ Biometric authentication is highly reliable
Biometric authentication is highly reliable, because physical
human characteristics are unique and much more difficult to
forge than the traditional use of security codes or PINs,
passwords and hardware keys.
Slide-42
Disadvantages of Biometric Authentication
3. Biometric systems may violate user’s privacy.
❖ Biometric characteristics are sensitive data that may contain a lot of
personal information. The DNA (being the typical example) contains
(among others) the user’s preposition to diseases. This may be a very
interesting piece of information for an insurance company.
❖ The body odor can provide information about user’s recent
activities.
❖ It is also told that people with asymmetric fingerprints are more
likely to be homosexually oriented, etc.
4. Although good for user authentication, biometrics cannot be
used to authenticate computers or messages.
❖ Biometric characteristics are not secret and therefore they
cannot be used to sign messages or encrypt documents. If my
fingerprint is not secret there is no sense in adding it to documents we
have written. Anyone else could do the same.
Slide-43
Disadvantages of Biometric Authentication
5. Use of biometric systems may also imply loss of anonymity.
❖ While one can have multiple identities when authentication methods
are based on something the user knows or has, biometric systems can
sometimes link all user actions to a single identity.
Slide-44
Disadvantages of Biometric Authentication
7. The fail to enroll rate brings up another important problem.
Not all users can use any given biometric system. People
without hands cannot use fingerprint or hand-based systems.
Visually impaired people have difficulties using iris or retina
based techniques. As not all users are able to use a specific
biometric system, the authentication system must be
extended to handle users falling into the FTE category. This
can make the resulting system more complicated, less secure
or more expensive.
8. Even enrolled users can have difficulties using a biometric
system. The FTE rate says how many of the input samples are
of insufficient quality. Data acquisition must be repeated if the
quality of input sample is not sufficient for further processing
and this would be annoying for users.
9. Lack of standards (or ignorance of standards) may also posses
a serious problem. Two similar biometric systems from two
different vendors are not likely to interoperate at present.
Slide-45
Biometric Devices
Biometric device is a device that translates personal
characteristics into a digital code that is compared
with a digital code stored in the database.
Some biometric devices include:
▪ Fingerprint Recognition,
▪ Facial Recognition
▪ Hand Geometry,
▪ Iris Scanning,
▪ Retinal Scanning,
▪ Voice Recognition and
▪ Signature Verification
Slide-46
Types of Biometric Technologies
There are two major classifications of biometric technologies
depending on the number of distinctive characteristics each
technology offer:
❑ Those that do identification and verification, like
▪ Finger scan
▪ Iris scan
▪ Retina scan
▪ Facial scan (optical and infrared)
4. Comparison:
the face print created by the software is compared to all face prints the system
has stored in its database.
5. Match or no match:
software decides whether or not any comparisons from step 4 are close enough
Slide-52
to declare a possible match.
Biometric Technology: Facial Scan
In the case of facial scan, it measures facial features like the-
▪ Distance between the eyes.
▪ Distance between the eyes and nose ridge.
▪ Angle of a cheek.
▪ Slope of the nose.
▪ Thickness of the lips.
▪ Facial Temperatures.
Slide-53
Biometric Technology: Hand Geometry/ Hand Scan
This technology uses distinctive features of the hand, such as geometry of
hand and fingers, for identity verification.
It is based on the fact that nearly every person’s hand is shaped differently
and that the shape of a person’s hand does not change after certain age.
These techniques include the estimation of length, width, thickness and
surface area of the hand. Various method are used to measure the hands.
Recent uses include the I. N. S. pass System, which scans a hand of frequent
travelers, so instead of presenting a passport for authentication these
frequent travelers swipe a card and do a hand scan. It is both convenient to
consumers and frees up human resources to attend for more higher risk
passengers.
The hand geometry can change due to age and health conditions.
Figure below shown a hand geometry scanner.
Slide-56
Biometric Technology Still in Drawing Board
Vein scan :
Another fairly new technology that uses the vein patterns on the back of the
hand for identification and authentication.
The technology has the potential of delivering high accuracy, in addition to
the advantage of being non-intrusive to the user.
Vein identification has been recently implemented in commercial products,
such as VeinID.
Lip movement :
camera captures images of how user lips move while user speaks a
passphrase.
Body Odor:
The body odor biometrics is based on the fact that virtually each human smell
is unique. The smell is captured by sensors that are capable to obtain the
odor from nonintrusive parts of the body such as the back of the hand. The
use of body odor sensors brings up the privacy issue as the body odor carries
a significant amount of sensitive personal information. It is possible to
diagnose some diseases or activities in the last hours (like sex, for example)
by analyzing the body odor.
Slide-57
Biometric Technology Still in Drawing Board
DNA:
A relatively new technology that relies on the analysis of DNA sequences for
identification and authentication.
DNA sampling is rather intrusive at present and requires a form of tissue,
blood or other bodily sample.
This method of capture still has to be refined. So far the DNA analysis has not
been sufficiently automatic to rank the DNA analysis as a biometric
technology.
The analysis of human DNA is now possible within 10 minutes. As soon as the
technology advances so that DNA can be matched automatically in real time,
it may become more significant. At present Biometric Systems DNA is very
entrenched in crime detection and so will remain in the law enforcement area
for the time being.
The DNA technology raises many concerns over “privacy issues, invasiveness
and data misuse and currently cannot be done fully automated.
Slide-58
Biometric Application
Biometric authentication is highly reliable, because physical
human characteristics are much more difficult to forge than
security codes, passwords, hardware keys sensors, fast
processing equipment and substantial memory capacity, so
the system are costly.
Biometric-based authentication applications include
workstation and network access, single sign-on, application
logon, data protection, remote access to resources,
transaction security, and Web security.
The promises of e-commerce and e-government can be
achieved through the utilization of strong personal
authentication procedures using biometric application.
Slide-59
Biometric Application
Secure electronic banking, investing and other financial
transactions, retail sales, law enforcement, and health and
social services are already benefiting from these technologies.
Biometric technologies are expected to play a key role in
personal authentication for large scale enterprise network
authentication environments, Point-of-Sale and for the
protection of all types of digital content such as in Digital
Rights Management and Health Care applications.
Utilized alone or integrated with other technologies such as
smart cards, encryption keys and digital signatures,
biometrics is anticipated to pervade nearly all aspects of the
economy and our daily lives.
Slide-60