Outline for November 25, 2014
Reading: text, § 12, 16, 32
- Passwords
- Problem: common passwords
- May be pass phrases: goal is to make search space as large as possible, distribution as uniform as possible
- Other ways to force good password selection: random, pronounceable, computer-aided selection
- Password Storage
- In the clear; Multics story
- Enciphered; key must be kept available
- Hashed; show UNIX versions, including salt
- Attacks
- Exhaustive search: password is 1 to 8 chars, say 96 possibles; it’s about 7×1016
- Inspired guessing: think of what people would like (see above)
- Random guessing: can’t defend against it; bad login messages aid it
- Scavenging: passwords often typed where they might be recorded as login name, in other contexts, etc.
- Ask the user: very common with some public access services
- Password aging
- Pick age so when password is guessed, it’s no longer valid
- Implementation: track previous passwords vs. upper, lower time bounds
- Ultimate in aging: One-Time Password
- Password is valid for only one use
- May work from list, or new password may be generated from old by a function
- Challenge-response systems
- Computer issues challenge, user presents response to verify secret information known/item possessed
- Example operations: f(x) = x+1, random, string (for users without computers), time of day, computer sends E(x), you answer E(D(E(x))+1)
- Note: password never sent on wire or network
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably effective), retinal scans, etc.
- Location
- Bind user to some location detection device (human, GPS)
- Authenticate by location of the device
- Information flow
- Information flow policy, confidentiality policy, integrity policy
- Example
- Entropy
- Random variables
- Joint probability
- Conditional probability
- Entropy (or uncertainty in bits)
- Joint entropy
- Conditional entropy
- Entropy-based analysis
- Flow of information from x to y
- Implicit flow of information
|
ECS 235A, Computer and Information Security Fall Quarter 2014
|