SlideShare une entreprise Scribd logo
Authentication mechanism enhancement
utilising secure repository for passwordless
handshake
Ioannis A. Pikrammenos, Panagiotis Tolis and
Panagiotis Perakis
School of Computing, Mediterranean College
– University of Derby, Athens, Greece
International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019
DOI: 10.5121/ijnsa.2019.11401
2
Introduction
• prevent the exposure of the user’s
password during the authentication
phase in a network
• change of passwords infrequent intervals
leaves little room for attackers
• enhanced capabilities of password
utilization improve the performance of the
systems
3
Structure
1. literature review
2. authentication protocols
3. security features of each proposal
4. proposed solution and its main
outcomes
5. discussion about challenges and future
work
6. conclusions
4
Authentication
• Authentication comes from the Greek
lemma αὐθεντικός (authentikos)
– is confirming the truth of an attribute of a
single piece of data claimed to be true by an
entity
• user identification was introduced to allow
the system to identify the user and thus
to specify his access privileges
5
Username
• should be created using the system-wide
character set
– should not be separated into discrete words
– should meet a specific limit of characters
• lower limit is one (1) character as there shouldn’t
be a “no one” (from Homer Odyssey) user
• systems-specific extend
– multiple systems = diverse usernames
• username once created cannot be
altered
6
Password
• to prove user authenticity to the system
• the more secure a password is the more
difficult it becomes for humans to conceal or
even remember it
– transmission of the password “over the air”
– password codeword is also exposed by its shape
– protection of the communication channel
– man-in-the-middle attack
– secrets change in time
7
Authentication procedure
• how one party verifies another's identity
• credentials are transmitted over the
network
• technologies used for security proposal
– Lightweight Directory Access Protocol,
– Kerberos
8
LDAP
• by providing a Domain Name (DN) and a set of
credentials, a client can use the bind
operation to authenticate itself to the directory
• there are different types of bind methods in
LDAP
– In a simple bind, the user presents a clear-text DN
and password to the LDAP server
9
Threats against LDAP
• Heartbleed
– length of payload greater than the amount of data
expected in the HeartbeatRequest message
• Session Hijacking
– Man-in-the-Middle attack
• the harassment of the communication channel
imposes severe security threats to the
authentication service
– the service can be restored while the incident
cannot
10
Kerberos
• offers a means of validating the identity of
individuals on an accessible
(unprotected) network
• conducts authentication by using
standard cryptography
– symmetric-key cryptography
– public-key cryptography
11
Kerberos authentication
12
Threats against Kerberos
• Rainbow table, given the poor-quality of the
user-selected passwords
• illegitimate person gains access to the KDC
database
• Man-In-The-Middle record all data on the wire
and even alter the transmitted data selectively
• weakness is that the key kC used to encrypt
the client's credentials is derived from a
password, and passwords are notoriously
vulnerable
13
Proposition
• Credentials’ current values are deterministic for
the authentication though stochastic in time
– set of passwords are linked to each username
• Username current value may be kept away
from the user knowledge
• one could identify the credentials set through
the identifier of the selected password’s thesis
along with the pre-computed list in the secure
media
– no one except the issuer-authentication service may
know the actual value of the identified password
14
Proposition – Smart Card
• Secrets precomputed and stored in a
secure repository
• under the control of the user but not
under his authority
• valid password is identified through the
list number
• alteration of the valid password may take
effect without the exposure of its value
15
Proposition - Kerberos
16
Kerberos oriented implementation
1. Authority Service Request step needs to be changed
• smart card’s ID as well as the enlisted password ID
AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime,
SCidCode, Pid)
2. database scheme at the AS has to transform the password
record from a fixed size variable to a fixed size list
• objectClass: SCidCodeuserPassword1
• objectClass: SCidCodeuserPassword2
• …
3. turn-based identification mechanism could be utilized when a
password has to be changed
4. the passwords may now be selected by the system
• the scope of using string2key and namely PBKDF2 mechanisms is
raised
5. host machine does not contain a local repository
• Ticket Granting Server needs to redirect the ticket’s destination from
the machine to the card
17
LDAP oriented implementation
1. smart card ID should be stored in AS
repository and linked to the user’s
principal name
2. password repository should be changed
from the terminal’s file system to the
smart card
18
Eliminated Threats
• Man in the Middle attack
– even by hijacking the session will have no clue of
the secret
• Dictionary – Brute force attacks
– there is no fixed length or format of the password
• Clone attack
– replay legitimate messages to hijack a session is not
further handful because of the dynamic change of
passwords
• Social Engineering
– user will not be able to expose something that
he/she does not know
19
Related work – Future wok
• the majority of current security proposals based
on Kerberos protocol are related to the
cryptographic aspect
• a smart card integration design was proposed
– swap the encryption-decryption mechanism from
terminal to smart card
• the above resolve the issues created by
dictionary attacks
– remains vulnerable against Brute Force and Man in
the Middle attacks
• If the smart card is breached, then the secrets
are exposed
– Future work could focus on securing the
authentication process end-to-end
20
Conclusions
• proposed solution is implemented alike
LDAP and Kerberos.
• a leeway of enhancements is presented
• changes required in protocols are
minimal while the impact is great
• authentication procedure is further
hardened, freed from known
vulnerabilities

Contenu connexe

Tendances

Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Security
SecuritySecurity
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
priyanka Garg
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
Bangladesh Network Operators Group
 
Digital signature
Digital signatureDigital signature
Digital signature
Janani S
 
Security Basics
Security BasicsSecurity Basics
Security Basics
ArchitecTerra Ltd.
 
Ch14
Ch14Ch14
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Shakas Technologies
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
 
Security
SecuritySecurity
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 

Tendances (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Cryptography
CryptographyCryptography
Cryptography
 
Security
SecuritySecurity
Security
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Ch14
Ch14Ch14
Ch14
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Security
SecuritySecurity
Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 

Similaire à AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
kamalakantas
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
Flaskdata.io
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
Nishant Pahad
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Shumon Huque
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
DIKSHABORKAR8
 
Lessson 3
Lessson 3Lessson 3
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Unit08
Unit08Unit08
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
Shehrevar Davierwala
 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantage
at MicroFocus Italy ❖✔
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
STS
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
DhananjaySingh23178
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
KIYALIBAN1
 

Similaire à AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE (20)

Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Unit08
Unit08Unit08
Unit08
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
HP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantageHP secure mail techincal brief and the ibe advantage
HP secure mail techincal brief and the ibe advantage
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 

Dernier

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Dernier (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

  • 1. Authentication mechanism enhancement utilising secure repository for passwordless handshake Ioannis A. Pikrammenos, Panagiotis Tolis and Panagiotis Perakis School of Computing, Mediterranean College – University of Derby, Athens, Greece International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.4, July 2019 DOI: 10.5121/ijnsa.2019.11401
  • 2. 2 Introduction • prevent the exposure of the user’s password during the authentication phase in a network • change of passwords infrequent intervals leaves little room for attackers • enhanced capabilities of password utilization improve the performance of the systems
  • 3. 3 Structure 1. literature review 2. authentication protocols 3. security features of each proposal 4. proposed solution and its main outcomes 5. discussion about challenges and future work 6. conclusions
  • 4. 4 Authentication • Authentication comes from the Greek lemma αὐθεντικός (authentikos) – is confirming the truth of an attribute of a single piece of data claimed to be true by an entity • user identification was introduced to allow the system to identify the user and thus to specify his access privileges
  • 5. 5 Username • should be created using the system-wide character set – should not be separated into discrete words – should meet a specific limit of characters • lower limit is one (1) character as there shouldn’t be a “no one” (from Homer Odyssey) user • systems-specific extend – multiple systems = diverse usernames • username once created cannot be altered
  • 6. 6 Password • to prove user authenticity to the system • the more secure a password is the more difficult it becomes for humans to conceal or even remember it – transmission of the password “over the air” – password codeword is also exposed by its shape – protection of the communication channel – man-in-the-middle attack – secrets change in time
  • 7. 7 Authentication procedure • how one party verifies another's identity • credentials are transmitted over the network • technologies used for security proposal – Lightweight Directory Access Protocol, – Kerberos
  • 8. 8 LDAP • by providing a Domain Name (DN) and a set of credentials, a client can use the bind operation to authenticate itself to the directory • there are different types of bind methods in LDAP – In a simple bind, the user presents a clear-text DN and password to the LDAP server
  • 9. 9 Threats against LDAP • Heartbleed – length of payload greater than the amount of data expected in the HeartbeatRequest message • Session Hijacking – Man-in-the-Middle attack • the harassment of the communication channel imposes severe security threats to the authentication service – the service can be restored while the incident cannot
  • 10. 10 Kerberos • offers a means of validating the identity of individuals on an accessible (unprotected) network • conducts authentication by using standard cryptography – symmetric-key cryptography – public-key cryptography
  • 12. 12 Threats against Kerberos • Rainbow table, given the poor-quality of the user-selected passwords • illegitimate person gains access to the KDC database • Man-In-The-Middle record all data on the wire and even alter the transmitted data selectively • weakness is that the key kC used to encrypt the client's credentials is derived from a password, and passwords are notoriously vulnerable
  • 13. 13 Proposition • Credentials’ current values are deterministic for the authentication though stochastic in time – set of passwords are linked to each username • Username current value may be kept away from the user knowledge • one could identify the credentials set through the identifier of the selected password’s thesis along with the pre-computed list in the secure media – no one except the issuer-authentication service may know the actual value of the identified password
  • 14. 14 Proposition – Smart Card • Secrets precomputed and stored in a secure repository • under the control of the user but not under his authority • valid password is identified through the list number • alteration of the valid password may take effect without the exposure of its value
  • 16. 16 Kerberos oriented implementation 1. Authority Service Request step needs to be changed • smart card’s ID as well as the enlisted password ID AS_REQ = (PrincipalClient, PrincipalService, IP_list, Lifetime, SCidCode, Pid) 2. database scheme at the AS has to transform the password record from a fixed size variable to a fixed size list • objectClass: SCidCodeuserPassword1 • objectClass: SCidCodeuserPassword2 • … 3. turn-based identification mechanism could be utilized when a password has to be changed 4. the passwords may now be selected by the system • the scope of using string2key and namely PBKDF2 mechanisms is raised 5. host machine does not contain a local repository • Ticket Granting Server needs to redirect the ticket’s destination from the machine to the card
  • 17. 17 LDAP oriented implementation 1. smart card ID should be stored in AS repository and linked to the user’s principal name 2. password repository should be changed from the terminal’s file system to the smart card
  • 18. 18 Eliminated Threats • Man in the Middle attack – even by hijacking the session will have no clue of the secret • Dictionary – Brute force attacks – there is no fixed length or format of the password • Clone attack – replay legitimate messages to hijack a session is not further handful because of the dynamic change of passwords • Social Engineering – user will not be able to expose something that he/she does not know
  • 19. 19 Related work – Future wok • the majority of current security proposals based on Kerberos protocol are related to the cryptographic aspect • a smart card integration design was proposed – swap the encryption-decryption mechanism from terminal to smart card • the above resolve the issues created by dictionary attacks – remains vulnerable against Brute Force and Man in the Middle attacks • If the smart card is breached, then the secrets are exposed – Future work could focus on securing the authentication process end-to-end
  • 20. 20 Conclusions • proposed solution is implemented alike LDAP and Kerberos. • a leeway of enhancements is presented • changes required in protocols are minimal while the impact is great • authentication procedure is further hardened, freed from known vulnerabilities