03 User Authentication
03 User Authentication
• Assignment 1/3
• Quiz 1/4
• Project 0/1
• MSE 0/1
• ESE 0/1
Overview
• Electronic user authentication principles
• Password-based authentication
• Token-based authentication
• Biometric authentication
• Remote user authentication
• Security issues for user authentication
• Practical application: an iris biometric system
• Recent Trends in User Authentications
Authentication
• Authentication is the process of determining whether someone or
something is, in fact, who or what it declares...
• Mechanisms:
• Passwords, Computer recognition software, Biometrics, E-mail or SMS
one-time password (OTP), OTP token, Peripheral device recognition
• All above can provide user authentication, can be used in both alone or
combined modes
• All have issues
• Steal token, forget password, overhead to manage passwords,
biometric problems include false positive/negative, acceptance rate.
Authentication procedure
• The authentication procedure consists of 4 stages:
• Identification
• of the user (who is it?) i.e. email_id
• Provision
• Any authentication information, which must be secret and
unforgeable. i.e. password
• Transmission
• of the authentication information to the system through a secure
channel.
• Validation
• of the authentication information w.r.t some reference information
(proof of correctness)
• Problems (errors, attacks) can occur in all those 4 stages.
Model for Digital User Authentication
• NIST SP 800-63-3 (2016) defines EUA as:
• the process of establishing confidence in user identity that are electronically
presented to any system.
• Workstation hijacking
• Attacker waits until a logged-in workstation is unattended
• Prevented: Automatically logging out after a period of inactivity. Intrusion
detection schemes can be used to detect changes in user behavior
Password Vulnerabilities
• Exploiting user mistakes
• Typically, user may write (off load) password due to less memorization.
• i.e. Preconfigured systems may shipped with datasets
• Prevented: Training, combination of password with other factor may help to
protect.
• Electronic monitoring
• When pass communicated across network for remote log in etc. becomes
vulnerable even after encryption.
• Simple encryption will not fix this problem, because the encrypted password may
be observed and reused by an adversary.
Key points: Countermeasures for Password
Vulnerability
• Stop unauthorized access to password file
• Intrusion detection measures
• Account lockout mechanisms
• Policies against using common passwords but rather hard to guess passwords
• Training & enforcement of policies
• Automatic workstation logout
• Encrypted network links
• Windows Passwords???
• https://www.techtarget.com/searchenterprisedesktop/definition/Security-Accounts-
Manager
Attacks Using Time: Countering Password Guessing
One of the goal of the defenders is to maximize the time needed to guess the
password
Anderson’s formula:
• P probability of guessing a password in specified period of time
• G number of guesses tested in 1 unit time
• T number of time units
• N number of possible passwords (|A|)
• Then P ≥ TG/N
Example *
• Goal : What is minimum password length ?
• Solution
• N ≥ TG/P = (365246060)104/0.5 = 6.311011
• N number of possible passwords
• Choose s such that sj=0 96j ≥ N
• So s ≥ 6, meaning passwords must be at least 6 chars long
Use of Hashed Passwords & Salt
• Widely used technique of password with salt values i.e. UNIX.
• User select/assigned password with the combination of fixed-length salt
value
• Initially, associated with machine time during password generation.
• Now, pseudorandom or random numbers.
1- Username
2- Password (encrypted password is stored in /etc/shadow file)
3- User ID
4- Group ID 5 User ID info
6- Home directory 7 Command/shell
Shadow File (in Linux Unix OS)
• /etc/shadow file store the actual password in encrypted format
• Contains user’s account with additional properties related to user password.
• /etc/shadow also contains one entry per line for each user (user account) of the
system, separated by “:”
1- Username
2- Password (encrypted with $id$salt$hashed format )
$1$ is MD5, $2a$ is Blowfish , $2y$ is Blowfish, $5$ is SHA-256 , $6$ is SHA-512
3- Last password change
4- Minimum number of days required between password changes
5 Maximum number of days the password is valid
6- Warn
Password File (in Windows OS)
• Security Account Manager is a database file that stores users' passwords
• It also utilized cryptographic measures to prevent unauthenticated users
accessing the system.
• Located %SystemRoot%/system32/config/SAM
• Cannot copy the SAM file while running of Windows. Windows kernel obtains
and keeps an exclusive filesystem lock on the SAM file.
• However, the in-memory copy of the contents of the SAM can be dumped
using various techniques (including pwdump)
Password Selection Strategies
• Clearly have problems with passwords
• Too short, easy etc.
• Goal to eliminate guessable passwords
• Still easy for user to remember, if include special characters.
• Techniques
• user education (My pet’s name is Mithu: MpniM)
• An apple a day keeps the doctor away: aaadktda
• computer-generated passwords
• Quite random in nature, difficult to remember
• reactive password checking (sys periodic checking)
• proactive password checking (at the time of selection)
• pass phrases instead of passwords
• password aging (Expire)
Proactive Password Checking
• Rule enforcement plus user advice, e.g.
• 8+ chars, upper/lower/numeric/punctuation
• Password cracker may helps to
• list of bad passwords (already compiled and check)
• Time (search time) and space (dictionary) issues
• Bloom Filter
• Is a data structure designed to tell you, rapidly and memory-efficiently,
whether an element is present in a set or not.
• use to build table based on dictionary using hashes
• check desired password against this table
• A German card
• Personal data, Document number, Card access number (six digit random
number), Machine readable zone (MRZ): the password
• Uses: ePass (government use), eID (general use), eSign (can have private key
and certificate)
Memory Card
• Can store but do not process data
• The most common magnetic stripe card, e.g. bank card
• Can include internal electronic memory
• Can be used alone for physical access
• Hotel rooms
• ATM
• Provide significant security when using PIN
• Drawbacks of memory cards include:
• Required a special reader
• Loss of token
• User dissatisfaction (OK for ATM, not OK for computer access)
Smart Token
• Physical characteristics:
• Include an embedded microprocessor
• A smart token that look like bank card, key, USB
• Interface:
• Manual interfaces include a keypad and display interaction
• Electronic interfaces communicate with a compatible
reader/writer
• Authentication Protocol:
• static: similar to memory cards
• dynamic: passwords created every minute; entered manually by
user or electronically
• challenge-response: computer creates a random number; smart
card generates a response
Smart Card
• credit-card like
• has own processor, memory, I/O ports
• ROM, EEPROM, RAM memory
• executes protocol to authenticate with reader/computer
• static: similar to memory cards
• dynamic: passwords created every minute; entered manually by
user or electronically
• challenge-response: computer creates a random number; smart
card generates a response (similar to PK)
User authentication with eID
Biometric authentication
• Authenticate user based on one of their physical characteristics:
• Pattern recognitions
• Technically expensive
• facial
• fingerprint
• hand geometry
• retina pattern
• iris
• signature
• voice
• ambient sound
Operation of a
biometric
system
Depending on application,
UA either verification or
identification purpose
Identification is biometric
info but no IDs; system
compares with stored
templates, if match then
sys authenticate the user
Biometric Accuracy
• The system generates a matching score (a number) that quantifies
similarity between the input and the stored template
• Concerns: sensor noise and detection inaccuracy
• Problems of false match/false non-match
Remote User Authentication
• The simplest form of user authentication is local authentication, but
authentication over network becomes more complex
• Problems of eavesdropping, replay
• Location based auth. like click on map locations to verify within the 30m etc.
• Memory challenge, in which year pictures belongs?
• User activity on mobile converted in questions, but suffer from friends, plus avg.
~9 sec. time required to answer the question may loss the battery as well
• Unlock the mobile phone 80 times/day by an average iPhone user
Recent Trends in User Authentications
Recent Trends in User Authentications
• MFA, OTP, 2FA
• Security token (e.g., Google Authenticator) app
• Physical Unclonable Function (PUF)
• Automatically unlock laptop if smart watch paired.