Authentication Techniques
Authentication Techniques
SECURE
COMPUTING
An Overview of Authentication
Techniques
Attack: Sniffing
Password Ping-Pong
Attacks Defenses
?? One-Time Passwords
Strength in Practice
Type of Average
Example Attack Attack
Space
Random 8-character Interactive 245
password or Off-Line
15 23
Dictionary Attack Interactive 2 to 2
or Off-Line
Mouse Pad Search Interactive 21 to 24
Type of Average
Example Attack Attack
Space
Password Off-Line 215 to 223
One-Time Password Token Interactive 219 to 223
54 63
One-Time Password Token Off-Line 2 to 2
63 116
Token with Public Key Off-Line 2 to 2
Biometrics in Practice
Type of Average
Example Attack Attack
Space
Random 8-Char Password Interactive 2 45
6
Biometric with 1% FAR Team 2
SECURE
COMPUTING
Thank You!
My e-
e -mail:
[email protected]
http://www.visi.com/crypto
Security Books
• Internet Cryptography.
Cryptography. Richard E. Smith. Addison-
Addison - Wesley: 1997.
Security Resources
Security E-
E -Mail Lists
– CERT-
CERT- advisory
[email protected]: The Computer Emergency Response Team
(CERT) issues advisories for security holes
– CERT-
CERT- tools [email protected]: CERT’s tools mailing list keeps subscribers up-
up-
to--date on security tool news.
to
– ntbugtraq
ntbugtraq@listserv.
@listserv.ntbugtraq
ntbugtraq.com:
.com: Moderated list of NT bugs
– firewall-
firewall-wizards@
wizards@nfr
nfr.net:
.net: The Firewall Wizards Mailing List moderated by
Marcus J. Ranum.
– cryptography@
cryptography@wasabisystems
wasabisystems.com:
.com: Cryptography mailing list
– microsoft_security@announce.
[email protected]:
microsoft.com: to keep track of Microsoft
security bug announcements