CH03 CompSec4e
CH03 CompSec4e
Areas of
risk
Assurance Level
More
specifically is
Four levels of
defined as: assurance
Describes an
organization’s Level 1
degree of The degree of confidence • Little or no confidence in the
asserted identity's validity
certainty that a in the vetting process
used to establish the
user has identity of the individual
to whom the credential Level 2
presented a was issued • Some confidence in the asserted
identity’s validity
credential that
refers to his or Level 3
• High confidence in the asserted
her identity The degree of confidence identity's validity
that the individual who
uses the credential is the
individual to whom the Level 4
credential was issued • Very high confidence in the
asserted identity’s validity
Potential Impact
• FIPS 199 defines three levels of potential impact on
organizations or individuals should there be a breach
of security:
o Low
• An authentication error could be expected to have a limited adverse
effect on organizational operations, organizational assets, or
individuals
o Moderate
• An authentication error could be expected to have a serious adverse
effect
o High
• An authentication error could be expected to have a severe or
catastrophic adverse effect
Table 3.2
Exploiting
Specific Popular Exploiting
multiple
account password user
password
attack attack mistakes
use
UNIX Implementation
Original scheme
• Up to eight printable characters in length
• 12-bit salt used to modify DES encryption into a
one-way hash function
• Zero value repeatedly encrypted 25 times
• Output translated to 11 character sequence
Vulnerabilities
Make
available
only to
privileged
users
• Password checker
o Compile a large dictionary of passwords not to use
• Bloom filter
o Used to build a table based on hash values
o Check desired password against this table
Table 3.3
• Electronic interface
o A smart card or other token requires an electronic interface to communicate with a
compatible reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor
• Memory
• I/O ports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Electronic Identity Cards
(eID)
Use of a smart card as a national Most advanced deployment is the
identity card for citizens German card neuer Personalausweis
Can serve the same purposes as other national Has human-readable data printed on its
ID cards, and similar cards such as a driver’s surface
license, for access to government and • Personal data
commercial services • Document number
• Card access number (CAN)
• Machine readable zone (MRZ)
Electronic
Functions
and Data
for
eID Cards
ATM
Security
Problems
Summary
• Digital user authentication • Biometric authentication
principles o Physical characteristics used in
o A model for digital user authentication biometric applications
o Means of authentication o Operation of a biometric
o Risk assessment for user authentication authentication system
o Biometric accuracy
• Password-based
• Remote user authentication
authentication o Password protocol
o The vulnerability of passwords
o Token protocol
o The use of hashed passwords
o Static biometric protocol
o Password cracking of user-chosen
o Dynamic biometric protocol
passwords
o Password file access control • Security issues for user
o Password selection strategies authentication
• Token-based authentication
o Memory cards
o Smart cards
o Electronic identity cards