Auth and Passwords Flashcards
Main Objectives(CANADAA)
- Authentication(identity) crypto
- Authorisation(permission)
- Confidentiality(encryption) crypto
- Data Integrity(unmodified) crypto
- Accountability(responsibility)
- Availability(access)
- Non repudiation(undeniability) crypto
3 types of Auth
- Something you know
- Something you have
- Something you are
Something you know(1)
- Passwords
2 Advantages of passwords
- simple to implement
- easy to understand
2 Disadvantages of passwords
- Users do not choose strong passwords
- can be exposed to keyloggers
How hackers crack passwords(2steps)
- sniff and extract password hash
- Store common passwords with precomputed hashes in dictionaries
Solution against keyloggers
One Time Passwords, new password each time log in, something you have
Something you have(3)
- OTP cards
- Smart cards
- ATM cards
OTP cards
- new password on card each time user logs in
- server verifies password
- password only generated when user enters PIN
Smart cards
- tamper resistant, breaks when cracked open physically
- smart card challenges smart card reader, then user enters PIN
Smart card 2 -ves
- Smart card reader must be trusted
- Smart card power consumption reveals contents stored
ATM cards
- magnetic strip on back of card stores data for auth
Problem and Solution for ATM cards
magnetic strip easy to copy
Sol: holograms/ other hard to copy elements on the cards
Something you are(Biometric)(7)
- Palm Scan
- Iris Scan
- Retina Scan
- Fingerprint
- Voice
- Face
- Signature
Palm Scan
-measures size of hand and fingers + curves
-better than fingerprint scans
Iris Scan + 2 +ves
-camera takes picture of iris and store features
+ve:
1. more socially acceptable
2. less intrusive
Retina Scan
-infrared light shot into user eyes and creates a signature based on retinal blood vessels
Fingerprint + 2 -ves
-reader scans curves of fingerprint
-ve:
1. not socially acceptable(crime)
2. less info than palm scan
Face
-facial recognition after taking picture
Voice + 1 -ve
-electronic coded signals of voice compared to databank for match
-ve:
1. easy to bypass
Signature + 1 +ve
-records signature, pressure, timing
+ve:
difficult to replicate
Problems with Biometrics(4) + Solution
- False Positive
- False Negative
- Varying social acceptance, less than password
- Key management issues, cannot revoke key and supposed to be unique. Key once revealed can be abused for impersonation
Sol: passwords: easily changed
+ve of Biometrics
- Convenient
Bypassing fingerprint readers
- Cloning using glass surfaces
- Rubber fingers, NOT issue with security personnel presence