User authentication crytography in cse engineering

468 views 33 slides Apr 23, 2024
Slide 1
Slide 1 of 33
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33

About This Presentation

cryto


Slide Content

User authentication
To guard against the baneful influence exerted by strangers
is therefore an elementary dictate of savage prudence.
Hence before strangers are allowed to enter a district, or
at least before they are permitted to mingle freely with
the inhabitants, certain ceremonies are often performed
by the natives of the country for the purpose of disarming
the strangers of their magical powers, or of disinfecting,
so to speak, the tainted atmosphere by which they are
supposed to be surrounded.
—The Golden Bough, Sir James George Frazer

Remote User Authentication Principles:
Inmostcomputersecuritycontexts,userauthenticationis
thefundamentalbuildingblockandtheprimarylineof
defense.
Userauthenticationisthebasisformosttypesofaccess
controlandforuseraccountability.
Userinformationneedstobestoredonanyserveror
computersystemthathe/shewishestouseandcouldbe
knowntosystemadministrators.
Typicalitemofauthenticationinformationassociatedwith
theuserIDispassword.
User ID and password enables administrators to set up
user’s access permissions and audit their activity.

Anauthenticationprocessconsistsoftwosteps:
•Identificationstep:Presentinganidentifierto
thesecuritysystem.
•Verificationstep:Presentingorgenerating
authenticationinformationthatconfirmsthe
bindingbetweentheentityandtheidentifier.

There are four general means of authenticating a user’s
identity, which can be used alone or in combination:
1)Something the individual knows: Examples include a
password, a personal identification number (PIN), or
answers to a prearranged set of questions.
2) Something the individual possesses: Examples include
cryptographic keys, electronic keycards, smart cards, and
physical keys.
3) Something the individual is (static biometrics): Examples
include recognition by fingerprint, retina, and face.
4) Something the individual does (dynamic biometrics):
Examples include recognition by voice pattern, handwriting
characteristics, and typing rhythm.
All of these methods, properly implemented and used,
can provide secure user authentication. But, these
methods have drawbacks.

Fornetwork-baseduserauthentication,themostimportant
methodsinvolvecryptographickeysandsomethingthe
individualknows,suchasapassword.
MutualAuthentication:
Mutualauthenticationprotocolsenablecommunicatingparties
tosatisfythemselvesmutuallyabouteachother’sidentityand
toexchangesessionkeys.
Centraltotheproblemofauthenticatedkeyexchangearetwo
issues:confidentialityandtimeliness
Topreventcompromiseofsessionkeys,essentialidentification
andsession-keyinformationmustbecommunicatedin
encryptedform.
Timeliness, is important because of the threat of message
replays.

Replay Attacks
where a valid signed message is copied and later
resent
simple replay
repetition that can be logged
repetition that cannot be detected
backward replay without modification
countermeasures include
a) use of sequence numbers (generally impractical)
b) timestamps (needs synchronized clocks,. protocol must
be both fault tolerant, to cope with network errors, and secure,
to cope with hostile attacks)
c) challenge/response (using unique nonce)

Becauseofthevariableandunpredictablenatureof
networkdelays,distributedclockscannotbeexpectedto
maintainprecisesynchronization.So,timestamp-based
proceduremustallowforawindowoftimesufficientlylarge
toaccommodatenetworkdelaysyetsufficientlysmallto
minimizetheopportunityforattack
The challenge-response approach is unsuitable for a
connectionless type of application, because it requires the
overhead of a handshake before any connectionless
transmission, effectively negating the chief characteristic of
a connectionless transaction.

One way authentication :
One application for which encryption is growing in popularity is
electronic mail.
The chief benefit of Email is that it is not necessary for the
sender and receiver to be online at the same time.
The e-mail message is forwarded to the receiver’s electronic
mailbox, where it is buffered until the receiver is available to
read it.
The message can be handled by the store-and-forward e-mail
protocol, such as the Simple Mail Transfer Protocol (SMTP) or
X.400
E-mail message should be encrypted such that the mail-
handling system is not in possession of the decryption key.
second requirement is that of authentication. The recipient
wants some assurance that the message is from the genuine
sender.

Remote user authentication using symmetric encryption :
Mutual Authentication:
Two-level hierarchy of symmetric encryption keys can be used
to provide confidentiality for communication in a distributed
environment ( the third party KDC distributes the session key
encrypting session key using master key )
Needham and Schroeder[NEED78] for secret key distribution
using a KDC . Below is the protocol.
Despite the handshake of steps 4 and 5, the protocol is still vulnerable to a
form of replay attack.
Adversary X can impersonate A and trick B into using the old key by simply
replaying step 3.
Authentication
steps

Denning[DENN81,DENN82]proposestoovercomethis
weaknessbyamodificationtotheNeedham/Schroeder
protocolthatincludestheadditionofatimestamptosteps2
and3.Herproposalassumesthatthemasterkeys,K
aand
K
b,aresecure,anditconsistsofthefollowingsteps.
TisatimestampthatassuresAandBthatthesessionkey
hasonlyjustbeengenerated.Thus,bothAandBknowthat
thekeydistributionisafreshexchange
AandBcanverifytimelinessbycheckingthat
Δt
1is the estimated normal discrepancy
between the KDC’s clock and the local clock (at
A or B)
Δt–network delay

TheDenningprotocolseemstoprovideanincreased
degreeofsecuritycomparedtotheNeedham/Schroeder
protocol.
AnewconcernintheDenning’sapproachisthatthe
clocksmustbesynchronizedthroughoutthenetwork.
whenasender’sclockisaheadoftheintendedrecipient’s
clock.,anopponentcaninterceptamessagefromthe
senderandreplayitlaterwhenthetimestampinthe
messagebecomescurrentattherecipient’ssite.This
replaycouldcauseunexpectedresults.suchattacksare
referredassuppress-replayattacks.
Onewaytocountersuppress-replayattacksistoenforcethe
requirementthatpartiesregularlychecktheirclocksagainstthe
KDC’sclock.
Theotheralternative,whichavoidstheneedforclock
synchronization,istorelyonhandshakingprotocolsusing
nonces

In [KEHN92], an attempt is made to respond to the concerns
about suppress replay attacks and at the same time fix the
problems in the Needham/Schroeder protocol.
Subsequently, an inconsistency in this latter protocol was
noted and an improved strategy was presented in
[NEUM93a]. The protocol is,
K
s-session key
T
b–time limit to use K
s
ticket

1.Ainitiatestheauthenticationexchangebygeneratinganonce,Na,andsending
thatplusitsidentifiertoBinplaintext.ThisnoncewillbereturnedtoAinan
encryptedmessagethatincludesthesessionkey,assuringAofitstimeliness.
2.BalertstheKDCthatasessionkeyisneeded.ItsmessagetotheKDCincludes
itsidentifierandanonce,Nb.ThisnoncewillbereturnedtoBinanencrypted
messagethatincludesthesessionkey,assuringBofitstimeliness.B’smessage
totheKDCalsoincludesablockencryptedwiththesecretkeysharedbyBand
theKDC.ThisblockisusedtoinstructtheKDCtoissuecredentialstoA;theblock
specifiestheintendedrecipientofthecredentials,asuggestedexpirationtimefor
thecredentials,andthenoncereceivedfromA.
3.TheKDCpassesontoAB’snonceandablockencryptedwiththesecretkey
thatBshareswiththeKDC.Theblockservesasa“ticket”thatcanbeused
byAforsubsequentauthentications,aswillbeseen.TheKDCalsosendsto
AablockencryptedwiththesecretkeysharedbyAandtheKDC.Thisblock
verifiesthatBhasreceivedA’sinitialmessage(IDB)andthatthisisatimely
messageandnotareplay(Na),anditprovidesAwithasessionkey(Ks)and
thetimelimitonitsuse(Tb).
4.AtransmitsthetickettoB,togetherwiththeB’snonce,thelatterencrypted
withthesessionkey.TheticketprovidesBwiththesecretkeythatisusedto
decryptE(Ks,Nb)torecoverthenonce.ThefactthatB’snonceisencryptedwith
thesessionkeyauthenticatesthatthemessagecamefromAandisnotareplay.

SupposethatAandBestablishasessionusingthe
aforementionedprotocolandthenconcludethatsession.
Subsequently,butwithinthetimelimitestablishedbythe
protocol,AdesiresanewsessionwithB.Thefollowing
protocolensues:

One-Way Authentication
symmetric encryption with some refinement is used for
one way authentication for Emails.
Following is the protocol,

Remote User Authentication using
Asymmetric Encryption:
Thisprotocoliscompactbut,requiresthesynchronizationof
clocks

Anotherapproach,proposedbyWooandLam
[WOO92a],makesuseofnonces.Theprotocol
consistsofthefollowingsteps
This protocol seems to be a secure protocol that takes
into account the various attacks.
The authors themselves spotted a flaw and submitted
a revised version of the algorithm in [WOO92b].

Revised version of the algorithm in [WOO92b]

One Way Authentication :
Public-keyencryptionapproachesrequirethateither
thesenderknowtherecipient’spublickey
(confidentiality),therecipientknowthesender’s
publickey(authentication),orboth(confidentiality
plusauthentication).
Public-keyencryptionapproachesaresuitablefor
E-mails.
Ifconfidentialityistheprimaryconcern,thenthe
followingisusedforEmails.
Themessageisencryptedwithaone-timesecretkey

Ifauthenticationistheprimaryconcern,thena
digitalsignaturemaysuffice.
Thistechniqueisopentoanotherkindoffraud.
Toavoidfraud,boththemessageandsignature
canbeencryptedwiththerecipient’spublickey.
AbovetwoschemesrequirethatBknowA’spublic
keyandbeconvincedthatitistimely.Aneffective
waytoprovidethisassuranceisthedigital
certificate.

Kerberos
Trustedauthenticationserversystemfrom
MIT
providescentralisedauthenticationserver
inadistributednetworkwhosefunctionisto
authenticateuserstoserversandserversto
users.
Kerberosreliesexclusivelyonsymmetric
encryption
Twoversionsinuse:4&5

Motivation:
Adistributedarchitectureconsistingofdedicateduser
workstations(clients)anddistributedorcentralizedservers.
Followingarethethreeapproachestosecurityin
distributedEnvironment.
1.Relyoneachindividualclientworkstationtoassurethe
identityofitsuserorusersandrelyoneachserverto
enforceasecuritypolicybasedonuseridentification(ID).
2.Requirethatclientsystemsauthenticatethemselvesto
servers,buttrusttheclientsystemconcerningtheidentityof
itsuser.
3.Requiretheusertoprovehisorheridentityforeach
serviceinvoked.Alsorequirethatserversprovetheir
identitytoclients.
Forsmallandclosedenv–option1or2
Foropenenv–option3

Kerberos Requirements
Kerberos first report identified following requirements :
Secure:AN/weavesdroppershouldnotbeabletoobtain
thenecessaryinfotoimpersonateauser.
Reliable:Kerberosshouldbehighlyreliableandshould
employadistributedserverarchitecturewithonesystem
abletobackupother.
•Transparent:usershouldnotbeawarethat
authenticationistakingplacebeyondtherequirementtoenter
apassword.
Scalable:supportmorenumberofclientsandservers.
Kerberosassumes a distributed client/server architecture
and employs one or more Kerberos servers to provide an
authentication service.

Kerberos v4:
Version 4 of Kerberos makes use of DES, to provide
the authentication service.
A simple Authentication Dialogue :
Inanunprotectednetworkenvironment,anyclient
canapplytoanyserverforservice.
Theobvioussecurityriskisthatofimpersonation.
Anopponentcanpretendtobeanotherclientand
obtainunauthorizedprivilegesonservermachine.
Tocounterthisthreat,serversmustbeableto
confirmtheidentitiesofclientswhorequest
service.
inanopenenvironment,abovewayof
authenticationplacesasubstantialburdenoneach
server.

Analternativeistouseanauthenticationserver
(AS)thatknowsthepasswordsofallusersand
storestheseinacentralizeddatabase.
TheASsharesauniquesecretkeywitheach
server
Eachoftheingredients(IDc,ADc,IDv)of
message(3)issignificant.

AmoresecureAuthenticationDialogue:
Twoproblemsofauthenticationinanopen
networkenvironmentinpreviousauthentication
schemeare,
1)Auserhastoenterapasswordeachtime
he/sherequestforservicefromserver.
2)Aplaintexttransmissionofthepassword
[message(1)].Aneavesdroppercouldcapturethe
passwordanduseanyserviceaccessibletothe
victim.

Tosolvetheseproblems,aschemeforavoiding
plaintextpasswordsandanewserver,knownas
theticket-grantingserver(TGS)areintroduced.
Thenewscenarioisasfollows.

The Version 4 Authentication Dialogue :

Kerberos Realms
a Kerberos environment consists of:
a Kerberos server
a number of clients, all registered with server
application servers, sharing keys with server
this is termed a realm
typically a single administrative domain
if have multiple realms, their Kerberos
servers must share keys and trust

KerberosRealmsandMultipleKerberi:
Afull-serviceKerberosenvironmentconsistingofaKerberos
server,anumberofclients,andanumberofapplication
serversrequiresthefollowing:
1.TheKerberosservermusthavetheuserIDandhashed
passwordsofallparticipatingusersinitsdatabase.Allusers
areregisteredwiththeKerberosserver.
2.TheKerberosservermustshareasecretkeywitheach
server.AllserversareregisteredwiththeKerberosserver
AboveenvironmentisreferredtoasaKerberosrealm.
AKerberosrealmisasetofmanagednodesthatshare
thesameKerberosdatabase.TheKerberosdatabase
residesontheKerberosmastercomputersystem.
ChangingoraccessingthecontentsofaKerberos
databaserequirestheKerberosmasterpassword
Tags