Outline for March 8, 2006
Reading: text, §12.2–12.5
- Greetings and felicitations!
- Puzzle of the day
- Attacks
- Exhaustive search: password is 1-8 chars, say 96
possibles; it's about 7×1016
- Inspired guessing: think of what people would like
(see above)
- Random guessing: can’t defend against it; bad
login messages aid it
- Scavenging: passwords often typed where they might
be recorded as login name, in other contexts, etc.
- Ask the user: very common with some public access
services
- Password aging
- Pick age so when password is guessed,
it’s no longer valid
- Implementation: track previous passwords vs. upper,
lower time bounds
- Ultimate in aging: One-Time Password
- Password is valid for only one use
- May work from list, or new password may be
generated from old by a function
- Challenge-response systems
- Computer issues challenge, user presents response
to verify secret information known/item possessed
- Example operations:
f(x) = x+1,
random, string
(for users without computers), time of day, computer sends
E(x), you answer
E(D(E(x))+1)
- Note: password never sent on wire or network
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably
effective), retinal scans, etc.
- Location
- Bind user to some location detection device
(human, GPS)
- Authenticate by location of the device
Version of March 7, 2006 at 6:15 PM
You can also obtain a PDF version of this.