SlideShare a Scribd company logo
1 of 15
Information and Network Security:47
Authentication Applications
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
User Authentication
๏ƒ˜fundamental security building block
๏ฌbasis of access control & user accountability
๏ƒ˜is the process of verifying an identity claimed by or for a system
entity
๏ƒ˜has two steps:
๏ฌidentification - specify identifier
๏ฌverification - bind entity (person) and identifier
๏ƒ˜distinct from message authentication
User Authentication
โ€ข User authentication is the basis for most types of access control and for
user accountability.
โ€ข RFC 2828 defines user authentication as the process of verifying an identity
claimed by or for a system entity.
โ€ข An authentication process consists of two steps:
โ€ข Identification step: Presenting an identifier to the security system.
(Identifiers should be assigned carefully, because authenticated identities
are the basis for other security services, such as access control service.)
โ€ข Verification step: Presenting or generating authentication information that
corroborates the binding between the entity and the identifier.โ€
โ€ข In essence, identification is the means by which a user provides a claimed
identity to the system; user authentication is the means of establishing the
validity of the claim.
Means of User Authentication
๏ƒ˜four means of authenticating user's identity
๏ƒ˜based one something the individual
๏ฌknows - e.g. password, PIN
๏ฌpossesses - e.g. key, token, smartcard
๏ฌis (static biometrics) - e.g. fingerprint, retina
๏ฌdoes (dynamic biometrics) - e.g. voice, sign
๏ƒ˜can use alone or combined
๏ƒ˜all can provide user authentication
๏ƒ˜all have issues
Means of User Authentication
โ€ข There are four general means of authenticating a user's identity, which can
be used alone or in combination:
โ€ข โ€ข Something the individual knows: Examples includes a password, a
personal identification number (PIN), or answers to a prearranged set of
questions.
โ€ข โ€ข Something the individual possesses: Examples include electronic
keycards, smart cards, and physical keys. This type of authenticator is
referred to as a token.
โ€ข โ€ข Something the individual is (static biometrics): Examples include
recognition by fingerprint, retina, and face.
โ€ข โ€ข Something the individual does (dynamic biometrics): Examples include
recognition by voice pattern, handwriting characteristics, and typing
rhythm.
Means of User Authentication
โ€ข All of these methods, properly implemented and used, can provide secure
user authentication.
โ€ข However, each method has problems.
โ€ข An adversary may be able to guess or steal a password. Similarly, an
adversary may be able to forge or steal a token.
โ€ข A user may forget a password or lose a token.
โ€ข Further, there is a significant administrative overhead for managing
password and token information on systems and securing such information
on systems.
โ€ข With respect to biometric authenticators, there are a variety of problems,
including dealing with false positives and false negatives, user acceptance,
cost, and convenience.
Authentication Protocols
โ€ข used to convince parties of each others identity and to exchange
session keys
โ€ข may be one-way or mutual
โ€ข key issues are
โ€ข confidentiality โ€“ to protect session keys
โ€ข timeliness โ€“ to prevent replay attacks
Replay Attacks
โ€ข where a valid signed message is copied and later resent
โ€ข simple replay
โ€ข repetition that can be logged
โ€ข repetition that cannot be detected
โ€ข backward replay without modification
โ€ข countermeasures include
โ€ข use of sequence numbers (generally impractical)
โ€ข timestamps (needs synchronized clocks)
โ€ข challenge/response (using unique nonce)
Replay Attacks
โ€ข Replay Attacks are where a valid signed message is copied and later resent.
Such replays, at worst, could allow an opponent to compromise a session
key or successfully impersonate another party.
โ€ข At minimum, a successful replay can disrupt operations by presenting
parties with messages that appear genuine but are not
โ€ข Possible countermeasures include the use of:
โ€ข โ€ข sequence numbers (generally impractical since must remember last
number used with every communicating party)
โ€ข โ€ข timestamps (needs synchronized clocks amongst all parties involved,
which can be problematic)
โ€ข โ€ข challenge/response (using unique, random, unpredictable nonce, but not
suitable for connectionless applications because of handshake overhead)
One-Way Authentication
โ€ข required when sender & receiver are not in communications at same
time (eg. email)
โ€ข have header in clear so can be delivered by email system
โ€ข may want contents of body protected & sender authenticated
One-Way Authentication
โ€ข One application for which encryption is growing in popularity is
electronic mail (e-mail).
โ€ข The very nature of electronic mail, and its chief benefit, is that it is
not necessary for the sender and receiver to be online at the same
time.
โ€ข Instead, the e-mail message is forwarded to the receiverโ€™s electronic
mailbox, where it is buffered until the receiver is available to read it.
โ€ข The "envelope" or header of the e-mail message must be in the clear,
so that the message can be handled by the store-and-forward e-mail
protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
One-Way Authentication
โ€ข However, it is often desirable that the mail-handling protocol not
require access to the plaintext form of the message, because that
would require trusting the mail- handling mechanism.
โ€ข Accordingly, the e-mail message should be encrypted such that the
mail- handling system is not in possession of the decryption key.
โ€ข A second requirement is that of authentication.
โ€ข Typically, the recipient wants some assurance that the message is
from the alleged sender.
Using Symmetric Encryption
โ€ข as discussed previously can use a two-level hierarchy of keys
โ€ข usually with a trusted Key Distribution Center (KDC)
โ€ข each party shares own master key with KDC
โ€ข KDC generates session keys used for connections between parties
โ€ข master keys used to distribute these to them
Using Symmetric Encryption
โ€ข A two-level hierarchy of symmetric encryption keys can be used to
provide confidentiality for communication in a distributed
environment.
โ€ข Usually involves the use of a trusted key distribution center (KDC).
Each party in the network shares a secret master key with the KDC.
โ€ข The KDC is responsible for generating session keys, and for
distributing those keys to the parties involved, using the master keys
to protect these session keys.
Assignment
โ€ข What is user authentication? What are the means of user
authentication
โ€ข Explain Replay Attacks and One-Way Authentication.

More Related Content

What's hot

BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
limsh
ย 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
Joe McCarthy
ย 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
keriann70
ย 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
ย 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
Ayebazibwe Kenneth
ย 

What's hot (20)

Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
ย 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
ย 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
ย 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
ย 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
ย 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
ย 
Networks
NetworksNetworks
Networks
ย 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
ย 
Ch01
Ch01Ch01
Ch01
ย 
Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3Information Assurance And Security - Chapter 2 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 3
ย 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
ย 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
ย 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
ย 
OSCh18
OSCh18OSCh18
OSCh18
ย 
Nw sec
Nw secNw sec
Nw sec
ย 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
ย 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
ย 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
ย 
Information Security
Information SecurityInformation Security
Information Security
ย 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
ย 

Similar to Information and network security 47 authentication applications

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
ย 

Similar to Information and network security 47 authentication applications (20)

Unit 5
Unit 5Unit 5
Unit 5
ย 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
ย 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
ย 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
ย 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
ย 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
ย 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
ย 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
ย 
Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthautha
ย 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
ย 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
ย 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
ย 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
ย 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
ย 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
ย 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
ย 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
ย 
Digital signature
Digital  signatureDigital  signature
Digital signature
ย 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
ย 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
ย 

More from Vaibhav Khanna

More from Vaibhav Khanna (20)

Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
ย 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
ย 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
ย 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
ย 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
ย 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
ย 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
ย 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
ย 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
ย 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
ย 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
ย 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
ย 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
ย 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
ย 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
ย 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
ย 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
ย 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
ย 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
ย 
Information and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issuesInformation and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issues
ย 

Recently uploaded

CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
ย 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
ย 

Recently uploaded (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
ย 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
ย 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
ย 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
ย 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
ย 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
ย 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
ย 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
ย 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
ย 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
ย 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
ย 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
ย 
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
ย 
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS LiveVip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
ย 
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธcall girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
ย 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
ย 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
ย 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
ย 

Information and network security 47 authentication applications

  • 1. Information and Network Security:47 Authentication Applications Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. User Authentication ๏ƒ˜fundamental security building block ๏ฌbasis of access control & user accountability ๏ƒ˜is the process of verifying an identity claimed by or for a system entity ๏ƒ˜has two steps: ๏ฌidentification - specify identifier ๏ฌverification - bind entity (person) and identifier ๏ƒ˜distinct from message authentication
  • 3. User Authentication โ€ข User authentication is the basis for most types of access control and for user accountability. โ€ข RFC 2828 defines user authentication as the process of verifying an identity claimed by or for a system entity. โ€ข An authentication process consists of two steps: โ€ข Identification step: Presenting an identifier to the security system. (Identifiers should be assigned carefully, because authenticated identities are the basis for other security services, such as access control service.) โ€ข Verification step: Presenting or generating authentication information that corroborates the binding between the entity and the identifier.โ€ โ€ข In essence, identification is the means by which a user provides a claimed identity to the system; user authentication is the means of establishing the validity of the claim.
  • 4. Means of User Authentication ๏ƒ˜four means of authenticating user's identity ๏ƒ˜based one something the individual ๏ฌknows - e.g. password, PIN ๏ฌpossesses - e.g. key, token, smartcard ๏ฌis (static biometrics) - e.g. fingerprint, retina ๏ฌdoes (dynamic biometrics) - e.g. voice, sign ๏ƒ˜can use alone or combined ๏ƒ˜all can provide user authentication ๏ƒ˜all have issues
  • 5. Means of User Authentication โ€ข There are four general means of authenticating a user's identity, which can be used alone or in combination: โ€ข โ€ข Something the individual knows: Examples includes a password, a personal identification number (PIN), or answers to a prearranged set of questions. โ€ข โ€ข Something the individual possesses: Examples include electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a token. โ€ข โ€ข Something the individual is (static biometrics): Examples include recognition by fingerprint, retina, and face. โ€ข โ€ข Something the individual does (dynamic biometrics): Examples include recognition by voice pattern, handwriting characteristics, and typing rhythm.
  • 6. Means of User Authentication โ€ข All of these methods, properly implemented and used, can provide secure user authentication. โ€ข However, each method has problems. โ€ข An adversary may be able to guess or steal a password. Similarly, an adversary may be able to forge or steal a token. โ€ข A user may forget a password or lose a token. โ€ข Further, there is a significant administrative overhead for managing password and token information on systems and securing such information on systems. โ€ข With respect to biometric authenticators, there are a variety of problems, including dealing with false positives and false negatives, user acceptance, cost, and convenience.
  • 7. Authentication Protocols โ€ข used to convince parties of each others identity and to exchange session keys โ€ข may be one-way or mutual โ€ข key issues are โ€ข confidentiality โ€“ to protect session keys โ€ข timeliness โ€“ to prevent replay attacks
  • 8. Replay Attacks โ€ข where a valid signed message is copied and later resent โ€ข simple replay โ€ข repetition that can be logged โ€ข repetition that cannot be detected โ€ข backward replay without modification โ€ข countermeasures include โ€ข use of sequence numbers (generally impractical) โ€ข timestamps (needs synchronized clocks) โ€ข challenge/response (using unique nonce)
  • 9. Replay Attacks โ€ข Replay Attacks are where a valid signed message is copied and later resent. Such replays, at worst, could allow an opponent to compromise a session key or successfully impersonate another party. โ€ข At minimum, a successful replay can disrupt operations by presenting parties with messages that appear genuine but are not โ€ข Possible countermeasures include the use of: โ€ข โ€ข sequence numbers (generally impractical since must remember last number used with every communicating party) โ€ข โ€ข timestamps (needs synchronized clocks amongst all parties involved, which can be problematic) โ€ข โ€ข challenge/response (using unique, random, unpredictable nonce, but not suitable for connectionless applications because of handshake overhead)
  • 10. One-Way Authentication โ€ข required when sender & receiver are not in communications at same time (eg. email) โ€ข have header in clear so can be delivered by email system โ€ข may want contents of body protected & sender authenticated
  • 11. One-Way Authentication โ€ข One application for which encryption is growing in popularity is electronic mail (e-mail). โ€ข The very nature of electronic mail, and its chief benefit, is that it is not necessary for the sender and receiver to be online at the same time. โ€ข Instead, the e-mail message is forwarded to the receiverโ€™s electronic mailbox, where it is buffered until the receiver is available to read it. โ€ข The "envelope" or header of the e-mail message must be in the clear, so that the message can be handled by the store-and-forward e-mail protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
  • 12. One-Way Authentication โ€ข However, it is often desirable that the mail-handling protocol not require access to the plaintext form of the message, because that would require trusting the mail- handling mechanism. โ€ข Accordingly, the e-mail message should be encrypted such that the mail- handling system is not in possession of the decryption key. โ€ข A second requirement is that of authentication. โ€ข Typically, the recipient wants some assurance that the message is from the alleged sender.
  • 13. Using Symmetric Encryption โ€ข as discussed previously can use a two-level hierarchy of keys โ€ข usually with a trusted Key Distribution Center (KDC) โ€ข each party shares own master key with KDC โ€ข KDC generates session keys used for connections between parties โ€ข master keys used to distribute these to them
  • 14. Using Symmetric Encryption โ€ข A two-level hierarchy of symmetric encryption keys can be used to provide confidentiality for communication in a distributed environment. โ€ข Usually involves the use of a trusted key distribution center (KDC). Each party in the network shares a secret master key with the KDC. โ€ข The KDC is responsible for generating session keys, and for distributing those keys to the parties involved, using the master keys to protect these session keys.
  • 15. Assignment โ€ข What is user authentication? What are the means of user authentication โ€ข Explain Replay Attacks and One-Way Authentication.