Unit-2 User Authentication
Unit-2 User Authentication
y and
Network
Security
Sixth Edition
by William Stallings
Chapter 15
User Authentication
Remote User-
Authentication Principles
• The process of verifying an identity claimed by
or for a system entity
• An authentication process consists of two
steps:
Verificatio
• Presenting an n step
identifier to the • Presenting or generating
security system authentication
information that
corroborates the binding
Identificati between the entity and
the identifier
on step
Means of User
Authentication
Something the individual Something the individual
knows possesses
• Examples include a password, • Examples include
a personal identification cryptographic keys, electronic
number (PIN), or answers to a are keycards,
There four
smart cards, and
prearranged set of questions physical
general means of keys
• This
authenticating a is referred to as a token
user’s identity,
which can be used
alone or in
combination
Something the individual is Something the individual
(static biometrics) does (dynamic biometrics)
• Examples include recognition • Examples include recognition
by fingerprint, retina, and by voice pattern, handwriting
face characteristics, and typing
rhythm
• Timestamps
• Requires that clocks among the various participants be synchronized
• Party A accepts a message as fresh only if the message contains a timestamp
that, in A’s judgment, is close enough to A’s knowledge of current time
• Challenge/response
• Party A, expecting a fresh message from B, first sends B a nonce (challenge)
and requires that the subsequent message (response) received from B contain
the correct nonce value
• There are a lot of good practices that we can follow to generate a strong
password and also the ways to manage them.
• Make the password pass the test: Yes, put your password through some
testing tools that you might find online in order to ensure that it falls under
the strong and safe password category.
Authentication Server
Mutual Authentication and solution
using KDC
One way
Authentication
If confidentiality is the primary concern, then the following may be
more efficient:
A è B: E(PUb , Ks) || E(Ks , M)
In this case, the message is encrypted with a one-time secret key. A
also encrypts this one-time key with B’s public key. Only B will be
able to use the corresponding private key to recover the one-time
key and then use that key to decrypt the message. This scheme is
more efficient than simply encrypting the entire message with B’s
public key.
If authentication is the primary concern, then a digital signature
may suffice:
A è B: M || E(PRa , H(M))
RUA (symmetric) Mutual Authentication and
Protocol
Solution by Denning
Her proposal assumes that the master keys, K a and Kb, are secure, and it consists of the
𝐴 → 𝐾𝐷𝐶: 𝐼𝐷𝐴||𝐼𝐷𝐵
following steps.