ATH Flashcards

1
Q

Authentication Identification

A
  • Identification = presenting an Identity
  • Authentication = Proving the claimed identity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do servers know their client?

A
  • Username/Password
  • PKI Certificates
  • Challenge Response Authentication
  • Synchronous Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Basis of Authentication

A

What you know PINs

Passwords

What you have Cards

  • *Tokens**
  • *Certificates**

What you are

  • Physical features
  • Personal habits

Where you are

  • Location (physical or virtual)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basis of Authentication

A

What you know

  • PINs
  • Passwords …

What you have

  • Cards
  • Tokens
  • Certificates

What you are

  • Physical features
  • Personal habits

Where you are

  • Location (physical or virtual)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standard Human Authentication Options

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password Problems

A

Weak Password

  • Can be compromised in seconds (Password Policies)

Need to store the passwords

  • Dangerous to rely on database being secure (Hashing)

Need to transmit password from user to host

  • Dangerous to rely on Internet being unsniffed (Security Protocols)

But: Weak passwords are weak passwords…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dictionary Attacks on Passwords

A

Attack 1:

  • Create dictionary of common words and names and their simple transformations
  • Use these to guess password

Attack 2:

  • Usually the hash function h is public and so is the password file
  • Compute h(word) for each word in dictionary
  • Find match

Attack 3:

  • Pre-compute dictionary
  • Look up matches

Cure: Check user passwd’s comply to policies, use “salt”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unix Password Salt

A

“Salt” is a 12 bit number between 0 and 4095

  • It is usually derived from the system clock and the process identifier
  • Compute h(password+salt); both salt and h(password+salt) are stored in the password table
  • User: gives password, system finds salt, computes h(password+salt), and checks for match

Using salt, the same password is computed in 4096 ways

  • Makes dictionary attack more difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric Authentication

A
  • Fingerprint
  • Face

less common:

  • Hand
  • Eye (Iris/Retina) Voice
  • Keyboarding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Categories of Biometric Application

A

Authentication

  • 1-to-1 / ref. measure from somewhere / verifies identity

Identification

  • 1-to-many / ref. measures from a database that also contains data about population-members / verifies identity

Vetting against a Blacklist

  • 1-to-many / ref. measures and data of a small population of wanted or unwanted people / can verify identity

Duplicate Detection

  • 1-to-many / ref. measures of a large population / may create an assertion ‘person already enrolled’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FAR vs FRR

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A

Performance

  • Greater than 99% accuracy with 0.1% false accept rate, using two flat fingerprints.

Advantages

  • Relatively mature technology
  • Multiple samples (10 fingers) increase accuracy
  • Existing law enforcement databases
  • Suitable for large-database identification

R&D Focus

  • Assessment of scan quality
  • Liveness testing to counteract spoofing Fast fingerprint reader
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Iris

A

Performance

  • Over 95% accuracy, small (<0.1% ) false accept rate.

Comment: 95 % accuracy still means: does not scale…

Advantages

  • Highly stable biometric over time
  • Probably suitable for large-database identification
  • Very low false accept rate

R&D Focus

  • Large-scale testing
  • Reliable and easy iris capture Enrollment capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Facial Recognition

A

Performance

  • About 90% accuracy with 1%
  • *false accept rate, given high-quality images**

(90 % accuracy means: does not scale…)

Advantages

  • Easy enrollment from photos
  • Public acceptance
  • Existing databases

R&D Focus

  • Variable environment, pose, aging, ethnicity
  • Watchlist matching, large database ID
  • FR performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Machine Readable Travel Documents (MRTD)

A

Backoffice

  • Databases
  • Datamining

Reader:

  • LF/UHF
  • Communication range
  • Coupling

Transponder tag

  • active/passive
  • 1bit/64kb
  • Controller/ cpu
  • read-only/ read write
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machine readable travel documents

A
  • *Existing documents are often already machine readable**
  • *(MRZ = „machine readable zone“)**
  • Name, Number of passport,Birthday, Validity date, parity number

+ Optional biometric information

+ electronic device (RF-chip) storing these and other information

17
Q

Electronic Passport

A

Physical document:

  • Datapage
  • Machine Readable Zone (MRZ)
  • Image of the owner
  • Physical security features

Digital document (RFID)

  • MRZ
  • Biometric Data (e.g. iris or fingerprints) Digital security features
18
Q

Information Stored on the Chip

A

(m = mandatory, o = optional)

Data groups (DG)

  1. Machine readable zone, MRZ (m)
  2. Image of the owner (jpeg) (m)
  3. Fingerprint (o)
  4. Iris (o)
19
Q

Securing Electronic Data (Summary)

A

Passive authentication (m)

  • Proves that the contents of SOD and DGs are authentic and not changed

Passive Authentication: Comparison of MRZs (o)

  • Proves that chip content and physical passport belong together

Active Authentication (o)

  • Prevents copying SOD, authenticates chip and proves that chip and physical passport belong together

Basic Access Control (o)

  • Prevents skimming, eavesdropping, and misuse

Extended Access Control (o)

  • Prevent unauthorized access to or skimming of biometric data
20
Q

Access Control – Biometric Data

A

Face and MRZ (less-sensitive)

  • Can be obtained from other sources
  • Required for general crossing borders
  • Basic Access Control

Fingerprints, Iris (sensitive)

  • Difficult to obtain from other sources
  • Required for individual countries
  • Extended Access Control (unspecified)
21
Q

Basic Access Control

A

After successful authentication:

  • Secure communication between IS and MRTD
  • Chip grants access to less-sensitive data (e.g. MRZ, image of the owner)
  • Basic Access Control is optional
  • EU-passports require Basic Access Control
  • US-passports do not
  • information can be read without knowledge or permission of the owner
22
Q

Extended Access Control

A

Secure sensitive biometric data

  • Fingerprints, Iris

PKI based approach (EU)

IS has its individual public key pair

IS requires certificate of passport-issueing country specifying access rights

  • Preconditions to get certificates
  • E.g. Germany requires „promise“ not to store data
23
Q

Inspection System - Revocation

A

Problem of lost or stolen inspection systems

  • Unauhorized access to sensitive data
  • Basic access control diminishes problem

Proposed solution: certificate revocation

  • Non-trivial! Chip has no on-line connection
  • Certificate expiration date
24
Q

Threats to Biometric Systems

A
  • Live Biometric capture, theft
  • Device tampering
  • Environmental tampering
  • Live Biometric simulation
  • (e.g. lighting, jamming)
  • Reference Biometric substitution
  • Infrastructure manipulation (e.g. power-outage)
  • Reference Biometric forgery
  • Message interception,
  • Device or System override/backdoor/trojan utilisation
  • modification, insertion
  • Stored Biometric capture, theft, change, substitution
  • Exception-Handling Procedures manipulation
  • Threshhold manipulation
25
Q

Properties of Biometric Systems

A
  • Failure is a normal function of biometric systems
  • There are always individuals where it does not work
  • Individuals live with their Biometric properties for the whole life
26
Q

Strong Authentication

A

Strong Authentication requires at least two factors to be involved

  • Know
  • Posses
  • Are
27
Q

Public Key C/R Authentication

A