Title: Authentication
1Authentication
2Definitions
- Identification - a claim about identity
- Who or what I am (global or local)
- Authentication - confirming that claims are true
- I am who I say I am
- I have a valid credential
- Authorization - granting permission based on a
valid claim - Now that I have been validated, I am allowed to
access certain resources or take certain actions - Access control system - a system that
authenticates users and gives them access to
resources based on their authorizations - Includes or relies upon an authentication
mechanism - May include the ability to grant course or
fine-grained authorizations, revoke or delegate
authorizations
Slides modified from Lorrie Cranor, CMU
3Building blocks of authentication
- Factors
- Something you know (or recognize)
- Something you have
- Something you are
- Mechanisms
- Text-based passwords
- Graphical passwords
- Hardware tokens
- Public key crypto protocols
- Biometrics
4Two factor systems
- Two factors are better than one
- Especially two factors from different categories
- Question What are some examples of two-factor
authentication?
5Evaluation
- Accessibility
- Memorability
- Depth of processing, retrieval, meaningfulness
- Security
- Predictability, abundance, disclosure,
crackability, confidentiality - Cost
- Environmental considerations
- Range of users, frequency of use, type of access,
etc.
6Typical password advice
7Typical password advice
- Pick a hard to guess password
- Dont use it anywhere else
- Change it often
- Dont write it down
- Do you?
Bank b3aYZ Amazon aa66x! Phonebill
p2ta1
8Problems with Passwords
- Selection
- Difficult to think of a good password
- Passwords people think of first are easy to guess
- Memorability
- Easy to forget passwords that arent frequently
used - Difficult to remember secure passwords with a
mix of upper lower case letters, numbers, and
special characters - Reuse
- Too many passwords to remember
- A previously used password is memorable
- Sharing
- Often unintentional through reuse
- Systems arent designed to support the way people
work together and share information
9How Long does it take to Crack a Password?
- Brute force attack
- Assuming 100,000 encryption operations per second
- FIPS Password Usage
- 3.3.1 Passwords shall have maximum lifetime of 1
year
Password Length
http//geodsoft.com/howto/password/cracking_passwo
rds.htmhowlong
10The Password Quiz
- What is your score?
- Do you agree with each piece of advice?
- What is most common problem in the class?
- Any bad habits not addressed?
11Check your password
https//www.google.com/accounts/EditPasswd
http//www.securitystats.com/tools/password.php
Question Why dont all sites do this?
12Text-based passwords
- Random (system or user assigned)
- Mnemonic
- Challenge questions (semantic)
- Anyone ever had a system assigned random
password? Your experience?
13Mnemonic Passwords
Four
F
Four
score
s
and
a
and
years
y
,
,
seven
s
seven
ago
a
our
o
Fathers
F
First letter of each word (with punctuation)
4sasya,oF
4sa7ya,oF
4s7ya,oF
Source Cynthia Kuo, SOUPS 2006
14The Promise?
- Phrases help users incorporate different
character classes in passwords - Easier to think of character-for-word
substitutions - Virtually infinite number of phrases
- Dictionaries do not contain mnemonics
Source Cynthia Kuo, SOUPS 2006
15Memorability of Password Study
- Goal
- examine effects of advice on password selection
in real world - Method experiment
- independent variables?
- Advice given
- Dependent variables?
- Attacks, length, requests, memorability survey
16Study, cont.
- Conditions
- Comparison
- Control
- Random password
- Passphrase (mnemonic)
- Students randomly assigned
- Attacks performed one month later
- Survey four months later
17Results
- All conditions longer password than comparison
group - Random passphrase conditions had significantly
fewer successful attacks - Requests for password the same
- Random group kept written copy of password for
much longer than others - Non-compliance rate of 10
- What are the implications?
- What are the strengths of the study? Weaknesses?
18Mnemonic password evaluation
- Mnemonic passwords are not a panacea, but are an
interesting option - No comprehensive dictionary today
- May become more vulnerable in future
- Users choose music lyrics, movies, literature,
and television - Attackers incentivized to build dictionaries
- Publicly available phrases should be avoided!
- C. Kuo, S. Romanosky, and L. Cranor. Human
Selection of Mnemonic Phrase-Based Passwords. In
Proceedings of the 2006 Symposium On Usable
Privacy and Security, 12-14 July 2006,
Pittsburgh, PA.
Source Cynthia Kuo, SOUPS 2006
19Password keeper software
- Run on PC or handheld
- Only remember one password
- How many use one of these?
- Advantages?
- Disadvantages?
20Forgotten password mechanism
- Email password or magic URL to address on file
- Challenge questions
- Why not make this the normal way to access
infrequently used sites?
21Challenge Questions
- Question and answer pairs
- Issues
- Privacy asking for personal info
- Security how difficult are they to guess and
observe? - Usability answerable? how memorable? How
repeatable? - What challenge questions have you seen?
- Purpose?
22Challenge questions
- How likely to be guessed?
- How concerned should we be about
- Shoulder surfing?
- Time to enter answers?
- A knowledgeable other person?
- Privacy?
23Graphical Passwords
- We are much better at remembering pictures than
text - User enters password by clicking on on the screen
- Choosing correct set of images
- Choosing regions in a particular image
- Potentially more difficult to attack (no
dictionaries) - Anyone ever used one?
24Schemes
- Choose a series of images
- Random1
- Passfaces2
- Visual passwords (for mobile devices)3
- Provide your own images
- R. Dhamija and A. Perrig, "Deja Vu A User Study
Using Images for Authentication," in Proceedings
of 9th USENIX Security Symposium, 2000. - http//www.realuser.com/
- W. Jansen, et al, "Picture Password A Visual
Login Technique for Mobile Devices," National
Institute of Standards and Technology Interagency
Report NISTIR 7030, 2003.
25Schemes
- Click on regions of image
- Blonders original idea click on predefined
regions 1 - Passlogix click on items in order 2
- Passpoints click on any point in order 3
- G. E. Blonder, "Graphical passwords," in Lucent
Technologies, Inc., Murray Hill, NJ, U. S.
Patent, Ed. United States, 1996. - http//www.passlogix.com/
- S. Wiedenbeck, et al. "Authentication using
graphical passwords Basic results," in
Human-Computer Interaction International (HCII
2005). Las Vegas, NV, 2005.
26Schemes
- Freeform
- Draw-a-Secret (DAS)
- I. Jermyn, et al. "The Design and Analysis of
GraphicalPasswords," in Proceedings of the 8th
USENIX SecuritySymposium, 1999. - Signature drawing
27Theoretical Comparisons
- Advantages
- As memorable or more than text
- As large a password space as text passwords
- Attack needs to generate mouse output
- Less vulnerable to dictionary attacks
- More difficult to share
- Disadvantages
- Time consuming
- More storage and communication requirements
- Shoulder surfing an issue
- Potential interference if becomes widespread
See a nice discussion in Suo and Zhu. Graphical
Passwords A Survey, in the Proceedings of the
21st Annual Computer Security Applications
Conference, December 2005.
28How do they really compare?
- Many studies of various schemes
- Faces vs. Story
- Method experiment
- independent participant race and sex, faces or
story - Dependent types of items chosen, liklihood of
attack - Real passwords used to access grades, etc.
- Also gathered survey responses
- Results
- we are highly predictable, particularly for faces
- Attacker could have succeeded with 1 or 2 guesses
for 10 of males! - Implications?
29Other examples
- Passpoints predictable too!
- Can predict or discover hot spots to launch
attacks.
Julie Thorpe and P.C. van Oorschot. Human-Seeded
Attacks and Exploiting Hot-Spots in Graphical
Passwords, in Proceedings of 16th USENIX Security
Symposium, 2007.
30Other uses of images
- CAPTCHA differentiate between humans and
computers - Use computer generated image to guarantee
interaction coming from a human - An AI-hard problem
Luis von Ahn, Manuel Blum, Nicholas Hopper and
John Langford. CAPTCHA Using Hard AI Problems
for Security, In Advances in Cryptology,
Eurocrypt 2003.
31More food for thought
- How concerned should we be about the weakest
link/worse case user? - Do we need 100 compliance for good passwords?
How do we achieve? - What do you think of bugmenot
- Is it possible to have authorization without
identification?
32Project Groups
- 3 groups of 4, 1 group of 3
- Form your group by the END of class next week
- Preliminary user study of privacy or security
application, mechanism, or concerns - Deliverables
- Idea
- Initial plan 5 points
- Plan 20 points
- Report 20 points
- Presentation 5 points
33Project Ideas
- Start with a question or problem
- Why dont more people encrypt their emails?
- How well does product X work for task Y?
- What personal information do people expect to be
protected? - Flip through chapters in the book papers
- Follow up on existing study
- Examine your own product/research/idea
- Examine something you currently find frustrating,
interesting, etc.
34Ideas?
35A Look Ahead
- Next week User studies
- pay attention to the method of study in your
readings - ALSO observation assignment
- Two weeks rest of authentication
- ALSO project ideas due
36Next weeks assignment
- Observe people using technology
- Public place, observe long enough for multiple
users - Take notes on what you see
- Think about privacy and security, but observe and
note everything - Write up a few paragraphs describing your
observations - Dont forget IRB certification