Password Authentication Flashcards
What are the two standard security functions?
IDentification of yourself as an authorised user
Authentication of yourself to the system as that user
What is an entity?
A user or a process in a system
What do we need to determine about the entity for authentication?
What the entity knows - Password, Secret
What the entity has - badge, token
What the entity is - biometrics
where the entity is - IP, Geo Location
What is Gollman’s principle of security?
It is important to determine which layer of the system the security mechanism should be placed at.
IE: Applicaiton, OS, Kernel, Hardware…
What must a system store about an entity or principal in order to allow authentication?
Set of authentication information Set of complementary information Set of complementary functions Set of authentication functions Set of selection functions
What is the set of authentication information and what is it used for?
The set of specific information required by entities to prove their identity (Passwords, tokens etc.)
This is used to bind an entity to an identity.
What is the set of complementary information and what is it used for?
Information stored on the system to validate the authentication information.
What are the complementary functions used for?
These functions generate the complementary information given the authentication information
What is the set of authentication functions?
These are the functions that verify identity by returning whether or not the login criteria has been met.
What is the set of selection functions?
Set of functions that allow an entity to create or alter the authentication and complementation functions, such as change passwords or request a new ID.
What is the password space?
The set of all password (all chars, in every combination, that can be in a password)
What is an attack vector in almost all modern public systems?
Authentication functions are always available and therefore always an attack vector
What are some protection mechanisms for authentication functions?
Exponential backoff: Wait time is x^n-1 for each n attempts.
Disconnection after N attempts
Jailing: Disable the account after N unsuccessful attempts.
What are the problems with using passwords?
Loss
Disclosure - either stolen or given
User - more passwords needed but same used across many sites.
Revocation - Disclosure of password to admin.
What are the hazard points of physical password entry?
Shoulder surfing
Interception of transmissions over the network
Keyboards can be adapted
Door entry pins etc have erosion and grease marks