800 likes | 990 Views
Access Control. Access Control. Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization: Are you allowed to do that? Once you have access, what can you do? Enforces limits on actions
E N D
Access Control • Authentication:Who goes there? • Determine whether access is allowed • Authenticate human to machine • Authenticate machine to machine • Authorization:Are you allowed to do that? • Once you have access, what can you do? • Enforces limits on actions • Note: Access control often used as synonym for authorization Chapter 7 Authentication
Chapter 7Authentication Passwords Biometrics Smartcard
Who Goes There? Are Have Know • How to authenticate a human to a machine? • Can be based on… • Something you know: a password • Something you have: a smartcard • Something you are: your fingerprint Chapter 7 Authentication
Password Chapter 7 Authentication
Something You Know • Passwords • Lots of things act as passwords! • PIN (Personal Identification Number) • Social security number • Mother’s maiden name • Date of birth • Name of your pet, etc. Are Have Know Chapter 7 Authentication
Trouble with Passwords - 1/2 • Passwords • are one of the biggest practical problemsfacing security engineers today. • Onesolution • use cryptographic keys as passwords • Cryptographic keys • are also large, expensive to maintain, • difficult to manage, • and they pollute the environment. Chapter 7 Authentication
Trouble with Passwords - 2/2 • Humans • are incapable of securely storing high-quality cryptographic keys, and • have unacceptablespeed and accuracy when performing cryptographic operations. Chapter 7 Authentication
Why Passwords? • Why is “something you know” more popular than “something you have” and “something you are”? • Two reasons • Cost: passwords are free • Convenience: easier for System Administrator to reset password than to issue new smartcard Chapter 7 Authentication
Password issues • Keys and Passwords • Choosing Passwords • Attacking Systems via Passwords • Password Verification • Math of Password Cracking • Other Password Issues Chapter 7 Authentication
Keys vs Passwords – 1/2 • Crypto keys • Spse key is 64 bits • Then 264 keys • Choose key at random • Then attacker must try about 263 keys • Passwords • Spse pwds are 8 characters, and 256 different choices for 1 character • Then 2568 = 264 pwds • Users do not select passwords at random • Attacker has far less than 263 pwds to try (dictionary attack) Chapter 7 Authentication
Keys vs Passwords - 2/2 • DictionaryAttack • “dictionary” of 220≈1,000,000passwords: reasonable probability to crack any given password • But for randomly generated 64-bits key • Given of 220≈ 1,000,000 passwords, • Then the chance to success is only220 / 264 = 1/ 244≈ 1/17,000,000,000,000 • Nonrandomness of pwds is the root of problems Chapter 7 Authentication
Choosing Password - 1/4 • Bad passwords • frank • Fido • password • 4444 • Pikachu • 102560 • AustinStamp • Good Passwords? • jfIej,43j-EmmL+y • 09864376537263 • P0kem0N • FSa7Yago • 0nceuP0nAt1m8 • PokeGCTall150 Chapter 7 Authentication
Choosing Password - 2/4 • Passphase isanother solution for pwd • a sequence of words or other text used to control access to a computer system • A passphrase is similar to a password in usage, but is generally longer for added security. • Experiment: three groups of users • Group A:At least 6 chars, 1 non-letter • Group B: Password based on passphrase • Group C: 8 random characters Chapter 7 Authentication
Choosing Password - 3/4 • Results • Group A:About 30% of pwds easy to crack • Group B:About 10% cracked • Passwords easy to remember • Group C: About 10% cracked • Passwords hard to remember winner Chapter 7 Authentication
Choosing Password - 4/4 • Assigned passwords sometimes best • User compliance hard to achieve • In each case, 1/3rd did not comply and about 1/3rd of those easy to crack! • If passwords not assigned, best advice is • Choose passwords based on passphrase • Use pwd cracking tool to test for weak pwds • Require periodic password changes? Chapter 7 Authentication
Attacks on Passwords - 1/2 • Attacker could… • Target one particular account • Target any account on system • Target any account on any system • Attempt denial of service (DoS) attack • Common attack path • Outsider normal user administrator • May only require one weak password! Chapter 7 Authentication
Attacks on Passwords - 2/2 • Suppose system locks after 3 bad passwords. How long should it lock until SA restores service ? • 5 seconds – (insufficient to deter automatic attack) • 5 minutes – (open door to a DOS) • What are +’s and -’s of each? • The correction answer of it is not readily apparent Chapter 7 Authentication
Password Verification - 1/5 • To determine the validity of an entered password, the computer must have something to compare against • But need a way to verify passwords • Store pwds in a file • Store pwds in a file after hashing • Store pwds in a file after salt hashing • Bad idea to store passwords in a file Chapter 7 Authentication
Password Verification - 2/5 • Cryptographic solution: hash the passwords • Store y = hash(password) • Can verify entered password by hashing • If attacker obtains password file, he does not obtain passwords • Of course, • If attacker with pwd file can guess x and check whether y = hash(x), then attacker has found pwd! • But, • At least, the attacker can not use the file directly! Chapter 7 Authentication
Password Verification - 3/5 • Spse attacker pre-computeshash(x) for all xin a dictionary of common pwds • and attacker gets access to pwd file containing hashed pwds • Attacker only needs to compare hashes to his pre-computed dictionary • Same attack will work each time • Can we prevent this attack? Or at least make attacker’s job more difficult? Chapter 7 Authentication
Password Verification - 4/5 • Salt valuecan make attacker more difficult • Slat serves as IV of CBC mode: IV is not secret • Given password, choose random s, compute y = hash(pwd, s) and store the pair (s,y)in the password file • Note: The salt value is not secret Chapter 7 Authentication
Password Verification - 5/5 • Easy to verify password • To verify pwd z, retrieve (s,y) from pwd file • Compute hash(z,s) and compare it y • Attacker must recompute dictionary hashes for each user lots more work! • Spse Alice’s pwd is hashed with sa , Bob’s sb • Then to crack Alice’s pwd using the dictionary, • Trudy must compute hashes of the word in dic with sa , but crack Bob’s Trudy must recompute the hashes using sb Chapter 7 Authentication
Math of Pwd Cracking – 1/7 • Assumptions • Pwds are 8 chars, 128 choices per character • Then 1288 = 256 possible passwords • There is a password file with 210 hashed pwds • Attacker has dictionary of 220 common pwds (hashed pwds) • For experience, Probability of 1/4 that a pwd is in dictionary • Work is measured by number of hashes • Comparisons are free Chapter 7 Authentication
Math of Pwd Cracking – 2/7 • Case I • Attacker want to find Alice’s pwd w/o using the dictionary • Case II • Attacker want to find Alice’s pwd using the dictionary • Case III • Attacker want to find any one pwd in the hashed pwd file w/o using the dictionary • Case IV • Attacker want to find any one pwd in the hashed pwd file, using the dictionary Chapter 7 Authentication
Math of Pwd Cracking – 3/7 • Case I: password without dictionary • Must try 256/2 = 255 on average • Just like exhaustive key search • Case II: password with dictionary • Expected work is about 1/4 (219) + 3/4 (255) ≈ 254.6 • But in practice, try all in dictionary and quit if not found work is at most 220 and probability of success is 1/4 Chapter 7 Authentication
Math of Pwd Cracking – 4/7 • Case III: Attack any of 1024(210) pwds in file without dictionary • Assume all 210 passwords are distinct • Need 255 comparisons before expect to find password • If no salt, each hash computation gives 210 comparisons the expected work (number of hashes) is 255/210 =245 • If salt is used, expected work is 255 since each comparison requires a new hash computation Chapter 7 Authentication
Math of Pwd Cracking – 5/7 • Case IV: Attack any of 1024 passwords in file with dictionary • Probability at least one password is in dictionary is 1 - (3/4)1024 ≈ 1 • We ignore case where no pwd is in dictionary • If no salt, work is about 219/210 = 29 • If salt, expected work is less than 222(ref next slide) • Note: If no salt, we can precompute all dictionary hashes and amortize the work Chapter 7 Authentication
Math of Pwd Cracking – 6/7 • If salt, expected work is less than 222 • y0,y1,…,y1023: pwd hashes s0,s1,…,s1023: the corresponding salt values d0,d1,…,d(2^20)-1: dictionary words • Trudy first compute h(d0,s0) and compares it to y0, then she compute h(d1,s0) and compares it to y0 and so on. • That is, Trudy compares first compare y0 to all of hashed dic. words. Then she compares y1 to to all of hashed dic. words. Chapter 7 Authentication
Math of Pwd Cracking – 7/7 • If y0 is in dic (prob ¼), Trudy can expect to find it about 219hashes. If not (prob ¾), Trudy compute 220hashes • If Trudy find y0 is in dic, then she’s done. If not, Trudy will have 220 hashes before moves on to y1 • Continuing, in this manner, the expected work • ¼(219) + ¾•¼(220 +219) + (¾)2•¼(2•220 +219) + … + (¾)1023•¼(1023•220 +219) < 222 Chapter 7 Authentication
Other Password Issues -1/3 • Too many passwords to remember • Results in password reuse • Why is this a problem? – Trudy would be wise to try it other place where you use a password. • Failure to change default passwords • Social engineering • If someone calls you, claiming to be a SA who needs your pwd in order to correct prob., would you give out your pwd? - 34% will give it and 70% will give their pwd away for a candy bar Chapter 7 Authentication
Other Password Issues -2/3 • Who suffers from bad password? • ATM PIN: only you • Login password: every one of the system • Error logs may contain “almost” passwords • Bugs, keystroke logging, spyware, etc. Chapter 7 Authentication
Other Password Issues -3/3 • Popular password cracking tools • Password Crackers • Password Portal • L0phtCrack and LC4 (Windows) • John the Ripper (Unix) • Admins should use these tools to test for weak passwords since attackers will! • Good article on password cracking • Passwords - Conerstone of Computer Security Chapter 7 Authentication
Passwords • The bottom line • Password cracking is too easy! • One weak password may break security • Users choose bad passwords • Social engineering attacks, etc. • The bad guy has all of the advantages • All of the math favors bad guys • Passwords are a big security problem Chapter 7 Authentication
Biometrics Chapter 7 Authentication
Something You Are • Biometric • “You are your key” Schneier • Examples • Fingerprint • Handwritten signature • Facial recognition • Speech recognition • Gait (walking) recognition • “Digital doggie” (odor recognition) • Many more! Are Have Know Chapter 7 Authentication
Why Biometrics? • Biometrics seen as desirable replacement for passwords • Cheap and reliable biometrics needed • Today, a very active area of research • Biometrics are used in security today • Thumbprint mouse • Palm print for secure entry • Fingerprint to unlock car door, etc. • But biometrics not too popular • Has not lived up to its promise (yet?) –Why? Chapter 7 Authentication
The DARK SIDE … • Social acceptance: Perceived as invasive; • People liked facial scans less as fingerprints as a substitute for a PIN in ATM. • Easy to forge: • Biometric measurements are easy to forge. • It's easy to steal a biometric after the measurement is taken. • Impossible to revoke: • What happens if a biometric is stolen? It can not be revoked…Once someone steals your biometric, it remains stolen for life. • Privacy: • issues…Biometrics are personal Chapter 7 Authentication
Ideal Biometric • Universal보편성 applies to (almost) everyone • In reality, no biometric applies to everyone • Distinguishing구별성 distinguish with certainty • In reality, cannot hope for 100% certainty • Permanent영구성 physical characteristic being measured never changes • In reality, want it to remain valid for a long time • Collectable수집성 easy to collect required data • Depends on whether subjects are cooperative • Safe, easy to use, etc., etc. Chapter 7 Authentication
Biometric Modes • Identification 식별 Who goes there? • Compare one to many • Example: The FBI fingerprint database • Authentication 인증 Is that really you? • Compare one to one • Example: Thumbprint mouse • Identification problem more difficult • More “random” matches since more comparisons • We are interested in authentication Chapter 7 Authentication
Two phases of Bio system • Enrollment phase • Subject’s biometric info put into database • Must carefully measure the required info • Itcould be needed slow and repeated measurement • A weak point of many biometric schemes • Must be very precise for good recognition • Recognition phase • Biometric detection when used in practice • Must be quick and simple • But must be reasonably accurate Chapter 7 Authentication
Cooperative Subjects • We are assuming cooperative subjects • In authentication,subjects are cooperative • In identification, problem often have uncooperative subjects • For example, facial recognition • Proposed for use in Las Vegas casinos to detect known cheaters • Also as way to detect terrorists in airports, etc. • Probably do not have ideal enrollment conditions • Subject will try to confuse recognition phase • Cooperative subjects make bio prob much more tractable!!! Chapter 7 Authentication
Biometric issues • Type of Error • Biometric Examples • Fingerprints • Hand Geometry • Iris Scan • Biometric Error Rates • Biometric Conclusions Chapter 7 Authentication
Biometric ExamplesType of Error Chapter 7 Authentication
Biometric Errors • Fraud rate기만율versus insult rate모욕률 • Fraud user A mis-authenticated as user B • Insult user A not authenticate as user A • For any biometric, can decrease fraud or insult, but other will increase • For example • 99% voiceprint match low fraud, high insult • 30% voiceprint match high fraud, low insult • Equal error rate: rate where fraud == insult • The useful measure for comparing different biometric system Chapter 7 Authentication
Biometric ExamplesFingerprint Chapter 7 Authentication
Fingerprint History - 1/2 • Ancient China: as a form of signature • Scientific Form • 1798 J.C. Major suggest that Fingerprint might be unique • 1823 Professor J. E. Purkinje discussed 9 fingerprint patterns • 1856 Sir W. Hershel used fingerprint (in India) on contracts • 1880 Dr. H. Faulds article in Nature about fingerprints for ID • 1883 M.Twain’s Life on the Mississippi, a murderer ID’ed by fingerprint Chapter 7 Authentication
Fingerprint History - 2/2 • Widespread use of fingerprint • 1892 Sir Francis Galton (cousin of Darwin) developed classification system • His system of “minutia” is still in use today • Also verified that fingerprints do not change • Some countries require a number of points (i.e., minutia지문특징) to match in criminal cases • In Britain, 15 points • In US, no fixed number of points required Chapter 7 Authentication
Fingerprint Comparison • Examples of loops제상문, whorls외상문 and arches궁상문 • Minutia extracted from these features Loop (double) Arch Whorl소용돌이꼴 Chapter 7 Authentication
Fingerprint Biometric - 1/2 • Capture image of fingerprint • Enhance image • Identify minutia Chapter 7 Authentication