IS05-Authencation

IS05-Authencation - Authentication Pintu Pintu R Shah In...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
intu Shah Authentication Pintu R Shah
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In this unit. . c Authentication basics c Password c Challenge response c SSO Pintu R Shah MPSTME SVKM's NMIMS 2 c Biometrics
Background image of page 2
Basics c Authentication: binding of identity to subject c Identity is that of external entity (my identity, etc .) c Subject is computer entity (process, etc .) Pintu R Shah MPSTME SVKM's NMIMS 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Establishing Identity c One or more of the following c What entity knows ( eg. password) c What entity has ( eg. badge, smart card) c What entity is ( eg. fingerprints, retinal characteristics) here entity is ( n front of a particular terminal) Pintu R Shah MPSTME SVKM's NMIMS 4 c Where entity is ( eg . In front of a particular terminal)
Background image of page 4
Authentication System c ( A , C , F , L , S ) c A (Authentication ) information that proves identity c C (complementary ) information stored on computer and used to validate authentication information c F complementation function; f : A C Pintu R Shah MPSTME SVKM's NMIMS 5 c L authentication functions that prove identity c S selection functions enabling entity to create, alter information in A or C
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Example c Password system, with passwords stored on line in clear text c A set of strings making up passwords c C = A c F singleton set of identity function { I } ngle equality test function { Pintu R Shah MPSTME SVKM's NMIMS 6 c L single equality test function { eq } c S function to set/change password
Background image of page 6
Passwords c Sequence of characters c Examples: 10 digits, a string of letters, etc . c Generated randomly, by user, by computer with user input c Sequence of words xamples: pass rases Pintu R Shah MPSTME SVKM's NMIMS 7 c Examples: pass-phrases c Algorithms c Examples: challenge-response, one-time passwords
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Clear text password c Prompt for UID and PW c User enters UID and PW c UID and PW validation c Authentication result Pintu R Shah MPSTME SVKM's NMIMS 8 c Inform user accordingly c Drawbacks c DB contains PW in clear text c PW travels in clear text from user’s computer to the server
Background image of page 8
MD of PW c Storing message digests as derived PW in the User DB c User authentication c Server side validation c Drawback Pintu R Shah MPSTME SVKM's NMIMS 9 c Replay attack
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Message Digests of Passwords tiger newroad april Message digest lgorithm Message digests of Passwords G%6$1 Vt^80+1 +{:>9mn Step 1: Calculate the message digests of the passwords on the server-side. Pintu R Shah MPSTME SVKM's NMIMS 10 algorithm passwords Step 2: Store the user ids and message digests of the passwords in the user database. Id Password Jyoti G%6$1 Amar Vt^80+1 Atul +{:>9mn User database Server User creation program
Background image of page 10
Adding randomness c Storing message digests as derived PW in the User DB c User sends a login request with UN only c Server creates a random challenge c User signs the random challenge with the MD of the PW Pintu R Shah MPSTME SVKM's NMIMS 11 c Server verifies the encrypted challenge.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/04/2011 for the course IT 100 taught by Professor Rickdas during the Spring '11 term at University of Mumbai.

Page1 / 38

IS05-Authencation - Authentication Pintu Pintu R Shah In...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online