《用户认证》PPT课件.ppt_第1页
《用户认证》PPT课件.ppt_第2页
《用户认证》PPT课件.ppt_第3页
《用户认证》PPT课件.ppt_第4页
《用户认证》PPT课件.ppt_第5页
已阅读5页,还剩29页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

第三讲 用户认证 User Authentication,User Authentication,fundamental security building block basis of access control & user accountability is the process of verifying an identity claimed by or for a system entity has two steps: identification - specify identifier verification - bind entity (person) and identifier distinct from message authentication,(RFC 2828) 验证系统实体声称的身份的过程,Means of User Authentication,four means of authenticating users identity based one something the individual knows - e.g. password, PIN possesses - e.g. key, token, smartcard is (static biometrics) - e.g. fingerprint, retina does (dynamic biometrics) - e.g. voice, sign can use alone or combined all can provide user authentication all have issues,Password Authentication,widely used user authentication method user provides name/login and password system compares password with that saved for specified login authenticates ID of user logging and that the user is authorized to access system determines the users privileges is used in discretionary access control (自主访问控制),Password Vulnerabilities,offline dictionary attack specific account attack popular password attack password guessing against single user workstation hijacking exploiting user mistakes exploiting multiple password use electronic monitoring,Countermeasures,stop unauthorized access to password file intrusion detection measures account lockout mechanisms policies against using common passwords but rather hard to guess passwords training & enforcement of policies automatic workstation logout encrypted network links,Use of Hashed Passwords,盐值:与分配用户口令的时间相关;伪随机数或随机数 使用盐值的目的: 防止重复的口令在口令文件中可见 增加离线字典攻击难度 使得攻击者不可能发现用户是否在多个系统中使用了相同的口令,加载新口令,验证口令,UNIX Implementation,original scheme 8 character password form 56-bit key 12-bit salt used to modify DES encryption into a one-way hash function 0 value repeatedly encrypted 25 times output translated to 11 character sequence now regarded as woefully insecure e.g. supercomputer, 50 million tests, 80 min sometimes still used for compatibility,Improved Implementations,have other, stronger, hash/salt variants many systems now use MD5 with 48-bit salt password length is unlimited is hashed with 1000 times inner loop produces 128-bit hash OpenBSD uses Blowfish block cipher based hash algorithm called Bcrypt uses 128-bit salt to create 192-bit hash value,Password Cracking(口令破解),dictionary attacks try each word then obvious variants in large dictionary against hash in password file rainbow table attacks precompute tables of hash values for all salts a mammoth table of hash values e.g. 1.4GB table cracks 99.9% of alphanumeric Windows passwords in 13.8 secs not feasible if larger salt values used,Password Choices,users may pick short passwords e.g. 3% were 3 chars or less, easily guessed system can reject choices that are too short users may pick guessable passwords so crackers use lists of likely passwords e.g. one study of 14000 encrypted passwords guessed nearly 1/4 of them would take about 1 hour on fastest systems to compute all variants, and only need 1 break!,口令破解使用的策略,尝试名字、姓名缩写、帐户名、其他个人信息,对每个用户尝试130中不同的组合 尝试不同字典中出现的词汇 将词汇进行排列来尝试破解,包括第一字母大写或添加控制符,所有字符都大写、反写单词、把字母“O”变成“0”等,这些排列增加100万个词汇 对前两部未考虑的词汇,尝试尝试各种大写置换,将为口令词汇列表增加约200万个词汇 这种约300万个词汇的枚举搜索,用最快速的思维机方案,并用所有可能的盐值加密所有的词汇,破解时间不超过1小时,对包含13797个账户样本集进行的口令破解,Password File Access Control,can block offline guessing attacks by denying access to encrypted passwords make available only to privileged users often using a separate shadow password file (影子口令文件:散列后的口令保存在于用户ID分离的单独文件中) still have vulnerabilities exploit O/S bug(操作系统软件漏洞) accident with permissions making it readable users with same password on other systems access from unprotected backup media sniff passwords in unprotected network traffic,Using Better Passwords,clearly have problems with passwords goal to eliminate guessable passwords whilst still easy for user to remember techniques: user education computer-generated passwords reactive password checking 后验口令检查 proactive password checking 先验口令检查,开源软件:Jack the Ripper口令破解器,Proactive Password Checking,rule enforcement plus user advice, e.g. 8+ chars, upper/lower/numeric/punctuation(大写/小写/数字/标点)开源软件:pam_passwdqc may not suffice password cracker (构造不可行口令字典) time and space issues (普度大学 30M) Markov Model generates guessable passwords hence reject any password it might generate Bloom Filter use to build table based on dictionary using hashes check desired password against this table,马尔可夫 模型的例子,验证口令能不能由马尔可夫模型产生。研究验证了二阶模型的良好效果,Token Authentication,object user possesses to authenticate, e.g. embossed card (凹凸卡-老式信用卡) magnetic stripe card (磁卡银行卡) memory card (存储卡-预付电话卡) Smartcard (智能卡生物特征ID卡),Memory Card,store but do not process data magnetic stripe card, e.g. bank card electronic memory card used alone for physical access with password/PIN for computer use drawbacks of memory cards include: need special reader loss of token issues user dissatisfaction,旅馆房间门禁, 银行卡,Smartcard,credit-card like has own processor, memory, I/O ports wired or wireless access by reader may have crypto co-processor ROM, EEPROM, RAM memory executes protocol to authenticate with reader/computer also have USB dongles 小巧而便宜的闪存设备,计算机的用户认证 最重要的是智能卡。 只读存储器(ROM):存储不变的数据(序列号,持卡人姓名) 电可擦写可编程存储器(EEPROM):存储应用程序和数据(协议,随时间改变的数据) 随机存取存储器(RAM):保存应用程序执行时产生的临时数据,智能卡与读卡器的通信初始化过程,Reset复位信号,对参数初始化 ATR复位应答,定义智能卡的参数、协议、执行功能 PTS协议类型选择,确定使用的协议和参数,Biometric Authentication,authenticate user based on one of their physical characteristics,Operation of a Biometric System,识别过程,验证过程,Biometric Accuracy,never get identical templates problems of false match / false non-match,与预先存储的用户模板比较 阈值的设定 误判 漏判,Biometric Accuracy,can plot characteristic curve pick threshold balancing error rates,Remote User Authentication,authentication over network more complex problems of eavesdropping, replay generally use challenge-response user sends identity host responds with random number user computes f(r,h(P) and sends back host compares value from user with own computed value, if match user authenticated protects against a number of attacks,用于远程用户认证基本质询-响应

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论