SlideShare uma empresa Scribd logo
1 de 35
Authentication: Overview
Paul Bui
What is authentication?
• Positive verification of identity (man or
machine)
• Verification of a person’s claimed identity
• Who are you? Prove it.
• 3 Categories:
– What you know
– What you have
– Who you are
What you know
• Password
• Passphrase
• PIN
What you have
• Digital authentication
– physical devices to aid authentication
• Common examples:
– eToken
– smart cards
– RFID
eToken
• Can be implemented on a USB key fob or a
smart card
• Data physically protected on the device itself
• On the client side, the token is accessed via
password
• Successful client-side authentication with the
password invokes the token to generate a stored
or generated passcode, which is sent to the
server-side for authentication.
eToken
• May store credentials
such as passwords,
digital signatures and
certificates, and
private keys
• Can offer on-board
authentication and
digital signing
Smart cards
• Size of a credit card
• Usually an embedded microprocessor with
computational and storage capabilities
• Programmable platforms:
– C/C++
– Visual Basic
– Java
– .Net (beta)
Smart Cards cont’d
• Contact vs. contactless
• Memory vs. microprocessor
RFID
• RFID - Radio Frequency IDentification
• Integrated circuit(s) with an antenna that can
respond to an RF signal with identity information
• No power supply necessary—IC uses the RF
signal to power itself
• Susceptible to replay attacks and theft
• Examples:
– Smart Tag, EZPass
– Garage parking permits
RFID
• 13.56Mhz read/write
support
• May communicate
with a variety of
transponders
(ISO15693,
ISO14443 Type A &
B, TagIt, Icode, etc.)
• Reader is controlled
via PCMCIA interface
using an ASCII
protocol
Who you are
• Biometric authentication
– Use of a biometric reading to confirm that a
person is who he/she claims to be
• Biometric reading
– A recording of some physical or behavioral
attribute of a person
Physical Biometrics
• Fingerprint
• Iris
• Hand Geometry
• Finger Geometry
• Face Geometry
• Ear Shape
• Retina
• Smell
• Thermal Face
• Hand Vein
• Nail Bed
• DNA
• Palm Print
Behavioral Biometrics
• Signature
• Voice
• Keystroke
• Gait
Fingerprints
• Vast amount of data available on
fingerprint pattern matching
• Data originally from forensics
• Over 100 years of data to draw on
– Thus far all prints obtained have been unique
Fingerprint Basics
• Global features
– Features that can be seen with the naked eye
– Basic ridge patterns
• Local features
– Minutia points
– Tiny unique characteristics of fingerprint
ridges used for positive identification
Basic Ridge Patterns
• Loop
• 65% of all
fingerprints
• Arch
• Plain and
tented arch
• Whorl
• 30% of all
fingerprints
• One complete
circle
Local Features
• Also known as minutia points
• Used for positive identification
• Two or more individuals may have the
same global features, but different minutia
• Minutia points do not have to be inside the
pattern area
Types of Minutia
• Ridge ending
• Ridge bifurcation
• Ridge divergence
• Dot or island – ridge so short it appears to
be a dot
• Enclosure – ridge separates and then
reunites around an area of ridge-less skin
• Short ridge – bigger than a dot
Minutia Characteristics
• Orientation
– The direction the minutia is facing
• Spatial frequency
– How far apart the ridges are around the point
• Curvature
– Rate of change of orientation
• Position
– X,Y location relative to some fixed points
Algorithms
• Image-based
• Pattern-based
• Minutia-based
Fingerprint Scanners
HP IPAQDigital Persona U.are.U Pro IBM Thinkpad T42
Biometric Authentication Terms
• False Acceptance Rate (FAR)
– False Match Rate (FMR)
– Percentage of access attempts by unauthorized
individuals which are nevertheless successful
• False Rejection Rate (FRR)
– False Non-Match Rate (FNMR)
– Percentage of access attempts by enrolled individuals
who are nevertheless rejected
• Equal Error Rate
– FAR = FRR
Review: Three Categories
• What you know
– Password
– PIN
• What you have
– e-Token
– RFID
• Who you are
– Biometrics
Enrollment
Raw Image
Data
Enrollment Database
Biometric
Template
Sampled
Image Data
Biometric Scanner
Image Processing
(Enrollment
Computer)
Biometric
Algorithm
(Enrollment
Computer)
Verification
Raw Image
Data
Enrollment Database
Biometric
Template
Sampled
Image Data
Biometric Scanner
Image Processing
(Enrollment
Computer)
Biometric
Algorithm
(Enrollment
Computer)
Comparison
Algorithm
Match? Yes or
No
Motivation
• Real-world considerations:
– What you know and what you have
• Can be stolen or forgotten
• Susceptible to replay attacks
– Who you are
• Unique biometrics that hinder replay attacks and
imposters
• Privacy issues arise
Authentication Token Formats
• A security token (authentication token) is a
representation of security-related data (not
to be confused with an e-Token)
• Examples:
– X.509 certificates
– Kerberos tickets
– Custom security tokens
X.509 Certificates
• Use of digital certificates issued by a trusted Certificate
Authority (e.g. VeriSign)
• A Digital Certificate contains information to assert an
identity claim
– Name
– Serial number
– Expiration dates
– Certificate holder’s public key (used for encrypting/decrypting
messages and digital signatures)
– Digital signature of Certificate Authority (so recipient knows that
the certificate is valid)
• The recipient may confirm the identity of the sender with
the Certificate Authority
Kerberos Tickets
• Clients share secret symmetric key with server
• Clients login to authentication server
• Server returns a Ticket-Granting Ticket (TGT) encrypted
with client’s key
• Client sends decrypted TGT to Ticket Granting Service
• TGS sends ticket authorizing network access and certain
services
• Session ticket data:
– Name
– Network address
– Time stamp
– Expiration dates
– Session key
Custom Security Tokens
• May contain additional context information:
– Access method
• wired, local terminal
• wired remote terminal
• wireless PDA
– Authentication method
• Password
• e-Token
• Fingerprint
– Trust level
Trust Level Extension
• Different trust levels for devices with
different levels of implementation reliability
• Still very abstract and should be further
developed
– definition
– representation
– storage
– exchange
– verification
– translation across trust domains
Example Authentication (Security)
Token Request
<AuthenticationToken>
<CreatedAt>08/03/2004 8:00:00 AM</CreatedAt>
<ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt>
<Username>Weaver</Username>
<KeyStr>FINGERPRINT_KEY_STRING</KeyStr>
<Technology>Fingerprint</Technology>
</AuthenticationToken>
Example Authentication (Security)
Token Reply
<TrustLevelSecToken>
<CreatedAt>08/03/2004 8:00:00 AM</CreatedAt>
<ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt>
<UserID>5323</UserID>
<TrustLevel>Fingerprint</TrustLevel>
<TokenIssuer>http://cs.virginia.edu/TrustSTS.asmx</TokenIssuer>
<TrustAuthority>http://cs.virginia.edu/TrustAuthority.asmx</TrustAuthority>
</TrustLevelSecToken>
Bibliography
• Authentication
– L. O’Gorman, “Comparing Passwords,
Tokens, and Biometrics for User
Authentication,” Proc. IEEE, Vol. 91, No. 12,
Dec. 2003, pp. 2019-2040.
• Kerberos
– http://www.computerworld.com/computerworl
d/records/images/pdf/kerberos_chart.pdf
• CS453 class slides

Mais conteúdo relacionado

Mais procurados

RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaRadio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaBikram Kumar Sinha
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid applicationPriyanka Singh
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management Systemrabeena tasleem
 
Rfid based library management system
Rfid based library management systemRfid based library management system
Rfid based library management systemiaitoinfotech
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDEcoTrackSystemsETSRF
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in librariesNabi Hasan
 
Materials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating CostsMaterials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating Costsloriayre
 
13203215 pss7
13203215 pss713203215 pss7
13203215 pss7samanmky
 
Radio frequency identification(rfid)
Radio frequency identification(rfid)Radio frequency identification(rfid)
Radio frequency identification(rfid)Soori Joy
 
2.2 direct data entry devices
2.2 direct data entry devices2.2 direct data entry devices
2.2 direct data entry devicesDave Smith
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps713200828
 
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANKartika Mahajan
 

Mais procurados (20)

RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaRadio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
Rfid based library management system
Rfid based library management systemRfid based library management system
Rfid based library management system
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Rfid technology and applications
Rfid  technology and applicationsRfid  technology and applications
Rfid technology and applications
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
Materials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating CostsMaterials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating Costs
 
Access control system
Access control systemAccess control system
Access control system
 
13203215 pss7
13203215 pss713203215 pss7
13203215 pss7
 
Radio frequency identification(rfid)
Radio frequency identification(rfid)Radio frequency identification(rfid)
Radio frequency identification(rfid)
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
2.2 direct data entry devices
2.2 direct data entry devices2.2 direct data entry devices
2.2 direct data entry devices
 
13200828 pps7
13200828 pps713200828 pps7
13200828 pps7
 
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIANAPPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
APPLICATION OF RFID TECHNOLOGY IN LIBRARIES AND ROLE OF LIBRARIAN
 

Semelhante a Authentication

Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
karsof systems id-card
karsof systems id-cardkarsof systems id-card
karsof systems id-cardColin Valencia
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology NEHA SINGH
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIThiteshasnani94
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.NextMark Diodati
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 

Semelhante a Authentication (20)

Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
MATRIX Biometrics Technology New
MATRIX Biometrics Technology NewMATRIX Biometrics Technology New
MATRIX Biometrics Technology New
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
karsof systems id-card
karsof systems id-cardkarsof systems id-card
karsof systems id-card
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 

Último

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 

Último (20)

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 

Authentication

  • 2. What is authentication? • Positive verification of identity (man or machine) • Verification of a person’s claimed identity • Who are you? Prove it. • 3 Categories: – What you know – What you have – Who you are
  • 3. What you know • Password • Passphrase • PIN
  • 4. What you have • Digital authentication – physical devices to aid authentication • Common examples: – eToken – smart cards – RFID
  • 5. eToken • Can be implemented on a USB key fob or a smart card • Data physically protected on the device itself • On the client side, the token is accessed via password • Successful client-side authentication with the password invokes the token to generate a stored or generated passcode, which is sent to the server-side for authentication.
  • 6. eToken • May store credentials such as passwords, digital signatures and certificates, and private keys • Can offer on-board authentication and digital signing
  • 7. Smart cards • Size of a credit card • Usually an embedded microprocessor with computational and storage capabilities • Programmable platforms: – C/C++ – Visual Basic – Java – .Net (beta)
  • 8. Smart Cards cont’d • Contact vs. contactless • Memory vs. microprocessor
  • 9. RFID • RFID - Radio Frequency IDentification • Integrated circuit(s) with an antenna that can respond to an RF signal with identity information • No power supply necessary—IC uses the RF signal to power itself • Susceptible to replay attacks and theft • Examples: – Smart Tag, EZPass – Garage parking permits
  • 10. RFID • 13.56Mhz read/write support • May communicate with a variety of transponders (ISO15693, ISO14443 Type A & B, TagIt, Icode, etc.) • Reader is controlled via PCMCIA interface using an ASCII protocol
  • 11. Who you are • Biometric authentication – Use of a biometric reading to confirm that a person is who he/she claims to be • Biometric reading – A recording of some physical or behavioral attribute of a person
  • 12. Physical Biometrics • Fingerprint • Iris • Hand Geometry • Finger Geometry • Face Geometry • Ear Shape • Retina • Smell • Thermal Face • Hand Vein • Nail Bed • DNA • Palm Print
  • 13. Behavioral Biometrics • Signature • Voice • Keystroke • Gait
  • 14. Fingerprints • Vast amount of data available on fingerprint pattern matching • Data originally from forensics • Over 100 years of data to draw on – Thus far all prints obtained have been unique
  • 15. Fingerprint Basics • Global features – Features that can be seen with the naked eye – Basic ridge patterns • Local features – Minutia points – Tiny unique characteristics of fingerprint ridges used for positive identification
  • 16. Basic Ridge Patterns • Loop • 65% of all fingerprints • Arch • Plain and tented arch • Whorl • 30% of all fingerprints • One complete circle
  • 17. Local Features • Also known as minutia points • Used for positive identification • Two or more individuals may have the same global features, but different minutia • Minutia points do not have to be inside the pattern area
  • 18. Types of Minutia • Ridge ending • Ridge bifurcation • Ridge divergence • Dot or island – ridge so short it appears to be a dot • Enclosure – ridge separates and then reunites around an area of ridge-less skin • Short ridge – bigger than a dot
  • 19. Minutia Characteristics • Orientation – The direction the minutia is facing • Spatial frequency – How far apart the ridges are around the point • Curvature – Rate of change of orientation • Position – X,Y location relative to some fixed points
  • 21. Fingerprint Scanners HP IPAQDigital Persona U.are.U Pro IBM Thinkpad T42
  • 22. Biometric Authentication Terms • False Acceptance Rate (FAR) – False Match Rate (FMR) – Percentage of access attempts by unauthorized individuals which are nevertheless successful • False Rejection Rate (FRR) – False Non-Match Rate (FNMR) – Percentage of access attempts by enrolled individuals who are nevertheless rejected • Equal Error Rate – FAR = FRR
  • 23. Review: Three Categories • What you know – Password – PIN • What you have – e-Token – RFID • Who you are – Biometrics
  • 24. Enrollment Raw Image Data Enrollment Database Biometric Template Sampled Image Data Biometric Scanner Image Processing (Enrollment Computer) Biometric Algorithm (Enrollment Computer)
  • 25. Verification Raw Image Data Enrollment Database Biometric Template Sampled Image Data Biometric Scanner Image Processing (Enrollment Computer) Biometric Algorithm (Enrollment Computer) Comparison Algorithm Match? Yes or No
  • 26. Motivation • Real-world considerations: – What you know and what you have • Can be stolen or forgotten • Susceptible to replay attacks – Who you are • Unique biometrics that hinder replay attacks and imposters • Privacy issues arise
  • 27. Authentication Token Formats • A security token (authentication token) is a representation of security-related data (not to be confused with an e-Token) • Examples: – X.509 certificates – Kerberos tickets – Custom security tokens
  • 28. X.509 Certificates • Use of digital certificates issued by a trusted Certificate Authority (e.g. VeriSign) • A Digital Certificate contains information to assert an identity claim – Name – Serial number – Expiration dates – Certificate holder’s public key (used for encrypting/decrypting messages and digital signatures) – Digital signature of Certificate Authority (so recipient knows that the certificate is valid) • The recipient may confirm the identity of the sender with the Certificate Authority
  • 29. Kerberos Tickets • Clients share secret symmetric key with server • Clients login to authentication server • Server returns a Ticket-Granting Ticket (TGT) encrypted with client’s key • Client sends decrypted TGT to Ticket Granting Service • TGS sends ticket authorizing network access and certain services • Session ticket data: – Name – Network address – Time stamp – Expiration dates – Session key
  • 30. Custom Security Tokens • May contain additional context information: – Access method • wired, local terminal • wired remote terminal • wireless PDA – Authentication method • Password • e-Token • Fingerprint – Trust level
  • 31. Trust Level Extension • Different trust levels for devices with different levels of implementation reliability • Still very abstract and should be further developed – definition – representation – storage – exchange – verification – translation across trust domains
  • 32.
  • 33. Example Authentication (Security) Token Request <AuthenticationToken> <CreatedAt>08/03/2004 8:00:00 AM</CreatedAt> <ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt> <Username>Weaver</Username> <KeyStr>FINGERPRINT_KEY_STRING</KeyStr> <Technology>Fingerprint</Technology> </AuthenticationToken>
  • 34. Example Authentication (Security) Token Reply <TrustLevelSecToken> <CreatedAt>08/03/2004 8:00:00 AM</CreatedAt> <ExpiresAt>08/03/2004 5:00:00 PM</ExpiresAt> <UserID>5323</UserID> <TrustLevel>Fingerprint</TrustLevel> <TokenIssuer>http://cs.virginia.edu/TrustSTS.asmx</TokenIssuer> <TrustAuthority>http://cs.virginia.edu/TrustAuthority.asmx</TrustAuthority> </TrustLevelSecToken>
  • 35. Bibliography • Authentication – L. O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-2040. • Kerberos – http://www.computerworld.com/computerworl d/records/images/pdf/kerberos_chart.pdf • CS453 class slides