Chapter 02 1st Authentication 2022
Chapter 02 1st Authentication 2022
Chapter 2
Authentication
Charles P. Pfleeger
Chapter 2
• In this chapter we present:
The first too of a tools that use frequently by
security professionals;
− authentication,
The other tools will present in in the next
Lectures, these tools are:
access control, and
cryptography.
Authentication
• The property of accurate identification is called
authentication;
The first critical tool for security professionals is:
authentication and its techniques & technologies.
In previously; Authentication is face-to-face interactions;
Computers have replaced many face-to-face
interactions with electronic ones.
With no vigilant neighbor to recognize that something
is awry,
people need other mechanisms to separate
authorized from unauthorized parties.
• The basis of computer security is controlled access:
someone is authorized to take some action on
something,
In security, the subject can be;
people, computer processes (executing programs),
network connections, devices, and similar active
entities.
Authentication
• Computers depend on data to recognize others;
• In computer systems, determining who a person
really is consists of two separate steps:
Identification:
− is the act of asserting who a person is.
− Identification is the means of verifying the identity of
a user, process, or device, typically as a prerequisite
for granting access to resources in a system.
like names, are often well:
known, public, and not protected.
Authentication:
− is the act of proving that asserted identity: that the
person is who she says she is.
− authentication is a technical measure that prevents
unauthorized individuals or processes from entering a
system.
Like password, card, fingerprint, …etc., that are:
private and necessarily protected.
Authentication;
Identification Versus Authentication
• Identification:
asserting who a person is,
is the means of verifying the identity of a user,
process, or device, typically as a prerequisite
for granting access to resources in a system.
Identities are often well known, predictable,
guessable or easily determined, such as;
− your name, Your bank account number,
− debit card number, email address, and
− other things are ways by which people and processes
identify you.
it does not provide the real protection,
Not protected.
Authentication;
Identification Versus Authentication
• Authentication should be;
proving that asserted identity.
is a technical measure that prevents
unauthorized individuals or processes from
entering a system.
Reliable and private,
Protected, and
Authentication mechanisms use any of four
qualities to confirm a user’s identity:
− Something the user knows;
Passwords, PIN numbers, passphrases, a secret
handshake, and mother’s maiden name.
− Something the user has;
Identity badges (tokens), physical keys, a driver’s
license, or a uniform are common examples of things
people have that make them recognizable.
Authentication;
Identification Versus Authentication
− Something the user is;
These authenticators, called biometrics, are based on
a physical characteristic of the user, such as;
− a fingerprint, retina and iris of the eye, blood vessels
in the finger or hand, a face (picture) or facial
features.
− These authentication methods are just starting to be
used in computer authentications.
− Something the user does;
include recognition by voice pattern, handwriting
characteristics, typing rhythm, and Signatures.
Script-Based Agent-based
Approach Approach Mutual
Challenge/ Time- Authentication
Response based
Tokens Tokens One-Way
Authentication
Authentication Based on Phrases and Facts:
Something You Know;
• A passwords were the first form of computer
authentication and remain popular;
these forms are becoming;
easier to use,
less expensive, and
more common.
• Password protection seems to offer a
relatively secure system for confirming identity
related information;
But human practice sometimes degrades its
quality.
• The use of passwords is fairly straightforward;
A user enters some piece of identification,
a name Or a user ID.
The protection system then requests a password
from the user.
Password Use
• Even though passwords are widely used, they
suffer from some difficulties of use:
Use; Supplying a password for each access to an object
can be inconvenient and time consuming.
Disclosure; If a user discloses a password to an
unauthorized individual, the object becomes immediately
accessible,
If the user then changes the password to re-protect
the object, the user must inform any other legitimate
users of the new password because their old password
will fail.
Revocation; To revoke one user’s access right to an object,
someone must change the password, thereby
causing the same problems as disclosure.
Loss; Depending on how the passwords are implemented,
it may be impossible to retrieve a lost or forgotten
password in some systems.
Attacking and Protecting Passwords
FIGURE 2-2: Hand Geometry Reader FIGURE 2-3: Hand Vein Reader (Permission for
(Graeme Dawes/Shutterstock) image provided courtesy of Fujitsu Frontech)
Problems with Use of Biometrics
• Biometrics come with several problems:
Biometrics are relatively new, and some
people find their use intrusive,
Biometric recognition devices are costly,
although as the devices become more popular,
their cost per device should go down.
Biometric readers and comparisons can
become a single point of failure,
All biometric readers use sampling and
establish a threshold for acceptance of a close
match,
The speed at which a recognition must be
done limits accuracy,
Problems with Use of Biometrics
Although equipment accuracy is improving, false
readings still occur;
false positive or false accept a reading that is
See
accepted when it should be rejected (that is, the
authenticator does not match) and
a false negative or false reject one that rejects when
it should accept.
Sidebar
Often, reducing a false positive rate increases false
negatives, and vice versa.
The consequences for a false negative are usually < for
2.6;
a false positive, so;
an acceptable system may have a false positive rate
of 0.001 percent but a false negative rate of 1%.
False positive: incorrectly confirming an identity.
False negative: incorrectly denying an identity.
Although we like to think of biometrics as unique
parts of an individual;
forgeries are possible, See Sidebar 2.7;
Problems with Use of Biometrics
• Remember that:
Biometric matches are not exact;
the issue is whether the rate of false positives and
false negatives is acceptable,
Authentication with biometrics uses a pattern or
template,
much like a baseline, that represents
measurement of the characteristic.
Biometrics are reliable for authentication but
are much less reliable for identification,
Biometrics depend on a physical characteristic
that can vary from one day to the next or as
people age,
• See Sidebars 2.8 - 2.12;
Authentication Based on Tokens: Something You Have