Cyber Security Lecture Notes 02
Cyber Security Lecture Notes 02
Lecture 2
Identification and Authentication
Dr Xiaoqi Ma
Outline
1 Identification and identity
2 Authentication
4 Managing passwords
5 Protecting passwords
6 Attacks on passwords
7 Summary
Identification
Definition of Identification: “The process of showing, proving or recognizing who or
what somebody / something is” – Oxford Advanced Learner’s Dictionary
Identification concerns the manner in which a user provides his unique identity to the IT
system
It means “You announce who you are”
Identity
Identities are often well known, predictable or guessable
The identity must be unique so that the system can distinguish among different users
Depending on operational requirements, one “identity” may describe one individual,
more than one individual, or one (or more) individuals only part of the time
Authentication
Definition of Authentication: “to prove that something is genuine, real or true” – Oxford
Advanced Learner’s Dictionary
Authentication is the process of associating an individual with his unique identity, that is,
the manner in which the individual establishes the validity of his claimed identity
It means “You prove that you are who you claim to be”
Basic Authentication Methods
****
Identification
You provide your username, which is the ID you registered with the
system
Authentication
Call back someone else, e.g. the caller’s manager or security officer
abcd1234
Protecting Passwords (2)
Access control enforced by the operating system
Restrict access to password files
Combination of cryptographic protection and access control
Password salting
Attacks on Passwords
Password guessing
Dictionary attack
Brute force attack
Pre-computation dictionary attack
Password Guessing
Passwords can be guessed by humans with knowledge of the user’s personal information:
The words “password”, “passcode”, and their derivatives
A row of letters from the qwerty keyboard – qwerty itself, asdf, or qwertyuiop
The name of user or their significant other, e.g. a relative or pet
Their birthplace or date of birth, or a relative’s
Car license plate number
Telephone or mobile number
A simple modification of one of the preceding, such as suffixing a digit, particularly 1, or reversing the
order of the letters
Dictionary Attack
Defeating an authentication mechanism by trying to determine its
password by searching likely possibilities
A dictionary attack successively tries all the words in a list containing
possible passwords
The list (dictionary) is a pre-arranged list of values
Dictionary attacks succeed because many people have a tendency to
choose passwords which are short, single words found in dictionaries or
simple, easily-predicted variations on words, such as appending a digit
Brute Force Attack
Search the password space exhaustively
For example, if passwords are strings consisting of the 26 characters A-Z and can be of any length
from 1 to 8 characters, the number of possible passwords will be