ECS401: Cryptography and Network Security: Module 5: Authentication Protocols
ECS401: Cryptography and Network Security: Module 5: Authentication Protocols
Network Security
2
Remote User Authentication Principles
One of the key aspects of cryptography and network/Internet security is authentication. Authentication helps establish trust
by identifying the particular user/system. Authentication ensures that the claimant is really who he/she claims to be.
There are many ways to authenticate a user. Traditionally, user ids and passwords have been used. But there are many
security concerns in this mechanism.
Passwords can travel in clear text or can be stored in clear text on the server, both of which are dangerous propositions.
Modern password-based authentication techniques use alternatives as encrypting passwords, or using something derived
from the passwords in order to protect them.
Authentication tokens add randomness to the password-based mechanism, and make it far more secure.
This mechanism requires the user to possess the tokens. Authentication tokens are quite popular in applications that
demand high security.
3
Remote User Authentication Principles
In most User
computer authentication is
security the basis for
contexts, user most types of
authentication access control
is the and for user
fundamental accountability.
building block
and the primary
line of defense.
4
Remote User Authentication Principles
The process of verifying an identity claimed by or for a system entity. An authentication process consists of two steps:
5
Remote User Authentication Principles
For example, user Alice Toklas could have the user identifier ABTOKLAS.
This information needs to be stored on any server or computer system that Alice wishes to use and could be known to system
administrators and other users.
A typical item of authentication information associated with this user ID is a password, which is kept secret (known only to Alice and
to the system).
If no one is able to obtain or guess Alice’s password, then the combination of Alice’s user ID and password enables administrators to
set up Alice’s access permissions and audit her activity.
Because Alice’s ID is not secret, system users can send her e-mail, but because her password is secret, no one can pretend to be
Alice.
In essence, identification is the means by which a user provides a claimed identity to the system; user authentication is the means of
establishing the validity of the claim.
Note that user authentication is distinct from message authentication. Message authentication is a procedure that allows
communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
6
Remote User Authentication Principles
There are four general means of authenticating a user’s identity, which can be used alone or in combination:
• Examples include a password, • Examples include
a personal identification cryptographic keys,
number (PIN), or answers to a electronic keycards,
prearranged set of questions. smart cards, and
physical keys. This
type of
authenticator is
Something Something referred to as a
the individual the individual token.
knows possesses
Something
Something
the individual
the individual
does
is (static
(dynamic
biometrics)
biometrics)
• Examples include recognition •Examples include
by voice pattern, handwriting recognition by
characteristics, and typing fingerprint,
rhythm. retina, and face.
7
Remote User Authentication Principles
All of these methods, properly implemented and used, can provide secure user authentication. However, each method has
problems.
8
Mutual Authentication
Central to the problem
of authenticated key • confidentiality
exchange are two • timeliness
issues:
To prevent masquerade and to prevent compromise of session keys, essential identification and session-key
information must be communicated in encrypted form. This requires the prior existence of secret or public keys
that can be used for this purpose.
The second issue, timeliness, is important because of the threat of message replays. Such replays, at worst, could
allow an opponent to compromise a session key or successfully impersonate another party. At minimum, a
successful replay can disrupt operations by presenting parties with messages that appear genuine but are not.
9
Mutual Authentication
Simple replay: The opponent simply copies a message and replays it later.
10
Mutual Authentication
One approach to coping with replay attacks
is to attach a sequence number to each
message used in an authentication
exchange.
11
Mutual Authentication
Instead, one of the following two general approaches is used:
12
Timestamps
It can be argued that the timestamp approach should not be used for connection-oriented applications because of the
inherent difficulties with this technique.
13
Challenge/response
14
One-Way Authentication
One application for which encryption is growing in popularity is electronic mail (e-mail).
The very nature of electronic mail, and its chief benefit, is that it is not necessary for the sender and receiver to
be online at the same time.
Instead, the e-mail message is forwarded to the receiver’s electronic mailbox, where it is buffered until the
receiver is available to read it.
The “envelope” or header of the e-mail message must be in the clear, so that the message can be handled
by the store-and-forward e-mail protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
However, it is often desirable that the mail-handling protocol not require access to the plaintext form of the
message, because that would require trusting the mail-handling mechanism.
Accordingly, the e-mail message should be encrypted such that the mail-handling system is not in possession of
the decryption key.
A second requirement is that of authentication. Typically, the recipient wants some assurance that the message is
from the alleged sender.
15