290 likes | 311 Views
Explore the various methods and challenges in establishing identity in computer systems, including logical and active access control, challenge-response systems, and biometrics such as fingerprint recognition and iris scanning. Understand how access control is granted based on user identity and possession of devices like tokens and smart cards. Learn about the advantages and disadvantages of different authentication techniques, ranging from physical biometrics to monitoring software license compliance with dongles. Discover the evolving field of biometrics authentication and the potential risks of key decay and digital theft in modern security systems.
E N D
ESTABLISHING IDENTITY part bcrh503 Jacky Hartnett 2011
Context • Proving Identity • First step in protecting CIA • Unsolved problem • No 100% effective way of telling who is using a remote computer • Most techniques developed are used in closed systems • require an initial registration or introduction process • Even PKI which was invented for use in open systems is mostly used in closed systems • However, access rights granted based on identity of user • Fundamental security technique
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Passive Access Control • The computer responds to a claimed identity • Authentication process initiated by the user NOT the computer • Computer waits for process to begin • Obvious two stages: • Claim identity • Verify claimed identity
Questions and answers • Questions and Answers • bank of questions and answers only user and system knows • system selects a set randomly • can ask more if responses inaccurate or slow • must include questions that it is reasonable no one else would know answer to
Challenge - response • Challenge - Response • have to know algorithm to turn challenge into correct response • challenge sent by system = 3 • response from user = mod3(ord(name) * 12) • algorithm is (ord(name) * 12) • Mostly used together with another device that contains the algorithm • something the user knows and has
What the user has • Tokens, cards and keys • credit / eftpos card • key • token • response calculator for challenges • device containing one time password list • Possession of device some degree of authentication
What the user has • Advantages: • cannot be copied (mostly) • probably notice loss • simple to use • Disadvantages • does not prove identity just possession • Used by themselves to monitor software license compliance • dongle
What the user has • Mostly used in conjunction with something the user knows or is • have device and prove right to have device by knowing something that only the true owner does • sometimes device stores this knowledge so local authentication can take place • EFTPOS / ATM cards
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
What the user is • Authenticates identity by validating physical characteristic of user • glamour end of authentication • surprising the number of unique features humans have • on verge of systems that are sufficiently cheap to be cost effective for a large number of users • Problem with replacing the authentication • Key decay • Faked • Digital version stolen
What the user is • Physical Biometrics: • Bertillonage - measuring body lengths (no longer used) • Fingerprint - analyzing fingertip patterns • Facial Recognition - measuring facial characteristics • http://www.face-rec.org/ • Hand Geometry - measuring the shape of the hand • http://biometrics.cse.msu.edu/hand_geometry.html
What the user is • Physical Biometrics: • Iris Scan - analyzing features of coloured ring of the eye • http://www.iridiantech.com/ • Retinal Scan - analyzing blood vessels in the eye • Vascular Patterns - analyzing vein patterns • http://www.dex.co.za/security-solutions/DexID-Vascular-Pattern-Biometric-Identification.htm • DNA - analyzing genetic makeup
What the user is • Behavioral Biometrics: • Speaker Recognition - analyzing vocal behavior • Signature - analyzing signature dynamics • http://consumerschoicepos.com/hhp_transaction_team_1500.html • Keystroke - measuring the time spacing of typed words • Other Biometrics: • Smart Cards - combining biometrics with identification cards
What the user is - Biometrics • Biometrics may be unique • BUT • They are NOT secret!
What the user is - Biometrics • Idea is that physical characteristic presented to device that measures identifying features of this • Still passive as user presenting evidence to authenticate claimed identity • Used in conjunction with what user has or knows
What the user is - Biometrics • Faking Fingerprints • Famous gummy finger experiments • http://cryptome.org/gummy.htm • Voice verification • Consistency (hab you gotch er cold?) • Hand Geometry • Passport control
What the user is - Biometrics Fingerprint templates Fingerprint (left) Feature Extraction (right)
Something the user can do • Can also detect pattern of system use as authentication • I never use VI with intent so a Unix user using VI and pretending to be me is highly suspicious • Can also use keyboard use • speed of typing • time interval between certain letters • spelling
What the user is - problems • Key decay • The more you use the same piece of authentication data the harder it is to protect it • Faked • As biometric data is not secret it is possible to create fakes • False fingerprints • Altered face dimensions (masks) • Stolen as a digital version • All biometrics are reduced to a digital data structure or template that captures the essential unique characteristics • This digital version is open to all standard attacks when stored
Topics • Logical Access Control continued • Passive Access Control • Q and A • Challenge-response • What user has • What user is - Biometrics • Active Access Control
Active Access Control • User does not initiate identification and authentication • Computer detects presence • Works out identity from characteristics that it can monitor • Sensors detect features and search database for match • One to many • Identifies and verifies at same time
Active Access Control • Need method for encoding unique features • Facial characteristics from video • Fingerprints (need person to present this) • Hand Geometry (need hand) • Need fast search algorithms to select best match • Match identity and accept as authenticated
Active Access Control • Active: one to many • Work out and encode selected features of individual • Search whole data base for match • Identify individual • Can be sufficient authentication or can ask for confirmation • Passive: one to one • Encode offered authentication • Check match against info stored at identity location • Confirm identity
Summary • Most PASSIVE logical access control systems use a combination of what user • knows, • has, • Is & can do • User submits an identity and system tries to authenticate it
Summary • Successful ACTIVE systems involve user wearing a badge that emits signals the system can detect and interpret • Honour system wearing correct badge • Identification from video image soon? • Should not involve any user actions
Summary • Access control can be found as a barrier to • access to a physical space • (layered approach and after hours access) • access to a particular device • (layered approach) • access to an operating system • when finally circumvent physical access control
Summary • Logical Access Control • Implemented as front end to all computer systems • Need to be sure that authenticating data is not captured as travels to code that processes this • Mostly done via passwords • What the user knows • Biometric authentication just becoming widespread • Authentication of actual computer user is largest unsolved problem in computer security