290 likes | 308 Views
ESTABLISHING IDENTITY part b crh503. Jacky Hartnett 2011. Context. Proving Identity First step in protecting CIA Unsolved problem No 100% effective way of telling who is using a remote computer Most techniques developed are used in closed systems
E N D
ESTABLISHING IDENTITY part bcrh503 Jacky Hartnett 2011
Context • Proving Identity • First step in protecting CIA • Unsolved problem • No 100% effective way of telling who is using a remote computer • Most techniques developed are used in closed systems • require an initial registration or introduction process • Even PKI which was invented for use in open systems is mostly used in closed systems • However, access rights granted based on identity of user • Fundamental security technique
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Passive Access Control • The computer responds to a claimed identity • Authentication process initiated by the user NOT the computer • Computer waits for process to begin • Obvious two stages: • Claim identity • Verify claimed identity
Questions and answers • Questions and Answers • bank of questions and answers only user and system knows • system selects a set randomly • can ask more if responses inaccurate or slow • must include questions that it is reasonable no one else would know answer to
Challenge - response • Challenge - Response • have to know algorithm to turn challenge into correct response • challenge sent by system = 3 • response from user = mod3(ord(name) * 12) • algorithm is (ord(name) * 12) • Mostly used together with another device that contains the algorithm • something the user knows and has
What the user has • Tokens, cards and keys • credit / eftpos card • key • token • response calculator for challenges • device containing one time password list • Possession of device some degree of authentication
What the user has • Advantages: • cannot be copied (mostly) • probably notice loss • simple to use • Disadvantages • does not prove identity just possession • Used by themselves to monitor software license compliance • dongle
What the user has • Mostly used in conjunction with something the user knows or is • have device and prove right to have device by knowing something that only the true owner does • sometimes device stores this knowledge so local authentication can take place • EFTPOS / ATM cards
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
What the user is • Authenticates identity by validating physical characteristic of user • glamour end of authentication • surprising the number of unique features humans have • on verge of systems that are sufficiently cheap to be cost effective for a large number of users • Problem with replacing the authentication • Key decay • Faked • Digital version stolen
What the user is • Physical Biometrics: • Bertillonage - measuring body lengths (no longer used) • Fingerprint - analyzing fingertip patterns • Facial Recognition - measuring facial characteristics • http://www.face-rec.org/ • Hand Geometry - measuring the shape of the hand • http://biometrics.cse.msu.edu/hand_geometry.html
What the user is • Physical Biometrics: • Iris Scan - analyzing features of coloured ring of the eye • http://www.iridiantech.com/ • Retinal Scan - analyzing blood vessels in the eye • Vascular Patterns - analyzing vein patterns • http://www.dex.co.za/security-solutions/DexID-Vascular-Pattern-Biometric-Identification.htm • DNA - analyzing genetic makeup
What the user is • Behavioral Biometrics: • Speaker Recognition - analyzing vocal behavior • Signature - analyzing signature dynamics • http://consumerschoicepos.com/hhp_transaction_team_1500.html • Keystroke - measuring the time spacing of typed words • Other Biometrics: • Smart Cards - combining biometrics with identification cards
What the user is - Biometrics • Biometrics may be unique • BUT • They are NOT secret!
What the user is - Biometrics • Idea is that physical characteristic presented to device that measures identifying features of this • Still passive as user presenting evidence to authenticate claimed identity • Used in conjunction with what user has or knows
What the user is - Biometrics • Faking Fingerprints • Famous gummy finger experiments • http://cryptome.org/gummy.htm • Voice verification • Consistency (hab you gotch er cold?) • Hand Geometry • Passport control
What the user is - Biometrics Fingerprint templates Fingerprint (left) Feature Extraction (right)
Something the user can do • Can also detect pattern of system use as authentication • I never use VI with intent so a Unix user using VI and pretending to be me is highly suspicious • Can also use keyboard use • speed of typing • time interval between certain letters • spelling
What the user is - problems • Key decay • The more you use the same piece of authentication data the harder it is to protect it • Faked • As biometric data is not secret it is possible to create fakes • False fingerprints • Altered face dimensions (masks) • Stolen as a digital version • All biometrics are reduced to a digital data structure or template that captures the essential unique characteristics • This digital version is open to all standard attacks when stored
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Active Access Control • User does not initiate identification and authentication • Computer detects presence • Works out identity from characteristics that it can monitor • Sensors detect features and search database for match • One to many • Identifies and verifies at same time
Active Access Control • Need method for encoding unique features • Facial characteristics from video • Fingerprints (need person to present this) • Hand Geometry (need hand) • Need fast search algorithms to select best match • Match identity and accept as authenticated
Active Access Control • Active: one to many • Work out and encode selected features of individual • Search whole data base for match • Identify individual • Can be sufficient authentication or can ask for confirmation • Passive: one to one • Encode offered authentication • Check match against info stored at identity location • Confirm identity
Summary • Most PASSIVE logical access control systems use a combination of what user • knows, • has, • Is & can do • User submits an identity and system tries to authenticate it
Summary • Successful ACTIVE systems involve user wearing a badge that emits signals the system can detect and interpret • Honour system wearing correct badge • Identification from video image soon? • Should not involve any user actions
Summary • Access control can be found as a barrier to • access to a physical space • (layered approach and after hours access) • access to a particular device • (layered approach) • access to an operating system • when finally circumvent physical access control
Summary • Logical Access Control • Implemented as front end to all computer systems • Need to be sure that authenticating data is not captured as travels to code that processes this • Mostly done via passwords • What the user knows • Biometric authentication just becoming widespread • Authentication of actual computer user is largest unsolved problem in computer security