44
44
Chapter 3 – User
Authentication
Dr. Kambiz
Ghazinour
Means of authenticating a user's
identity
• Something the individual knows.
• E.g. a password, a personal identification number (PIN), etc.
2
Risk Assessment for User
Authentication
• Security risk assessment in general is dealt with in Chapter 14 of your textbook.
• In brief, there are 3 separate concepts:
• Assurance level
• Potential impact
• Areas of risk
3
Potential Impact
• Standards for Security Categorization of Federal Information and Information Systems
(2004) defines three levels of potential impact on organizations or individuals if there is
a security breach:
• Low. Limited impact.
• Moderate. Serious adverse effect.
• High. Catastrophic adverse effect.
4
Password Authentication
• Common way to defend against intruders
• User provides name/login and password
• System compares password with the one stored for that specified login
• The user ID determines that the user is authorized to access the system
• The user ID determines the user’s privileges
• Is mostly used in Discretionary Access Control (DAC) which will be discussed later
5
Authentication Security Issues
• Eavesdropping
• Guessing, masquerading, finding ways to get username and password
• Host attack
• Attack the user’s file at the host where passwords and biometrics are stored
• Replay
• The adversary repeats a previously captured user response
• Client attack
• The adversary looks into the client’s computer to find the password, or some clues
• Trojan horse
• An application or hardware that tries to spy to find username and password.
• Denial of service
• Attacker attempts to disable a user authentication service by flooding the server
6
Password Vulnerabilities
• Offline dictionary attack. The attacker finds the system password file and compares the
password hashes against hashes of commonly used passwords.
• Specific account attack. Repeat guessing password of a particular account.
• Popular password attack. Use a popular password and try it against a wide range of users.
• Password guessing against single user. Use the knowledge about a user to guess password
• Workstation hijacking. The attacker waits until a logged-in workstation is unattended
• Exploiting user mistakes. Such as a user might write the password down.
• Exploiting multiple password use. A user is likely to use the same password on many
accounts/devices.
• Electronic monitoring. Attacker eavesdrop if the password is sent via email/network
7
A Password Security Technique
• UNIX password scheme and other Operating
Systems use this method.
• The user selects or is assigned a password. This
password is combined with a fixed-length salt
value (a pseudorandom or random number).
• The password and salt value are input to the slow
hash algorithm.
• The hashed password is then stored, together with
a plaintext copy of the salt, in the password file for
the corresponding user ID.
9
Modern approaches
• Complex password policies (use of mix of uppercase, lowercase, digits, symbols, etc.)
makes users to pick stronger passwords
• However password-cracking techniques have also improved
• The processing capacity available for password cracking has increased dramatically
• The use of sophisticated algorithms to generate potential passwords
• Studying examples and structures of actual passwords in use
10
Password Selection Strategies
• User education
• Computer generated passwords
• Reactive password checking
• Complex password policy
11
Summary
• User authentication
• Risk assessment
• Authentication security issues
• Password vulnerabilities
• Password cracking
• Password selection strategies
12