Outline for October 12, 2022
Reading: text, §12.1,12.4, 13
Due: Homework 2, due October 21; Progress report, due Nov 4
- Privacy-enhanced email
- Authentication
- Validating client (user) identity
- Validating server (system) identity
- Validating both (mutual authentication)
- Basis: what you know/have/are, where you are
- Passwords
- Problem: common passwords, easy to guess passwords
- Best: use passphrases: goal is to make search space as large as possible, distribution as uniform as possible
- Attacks
- Exhaustive search
- Guessing
- Scavenging: passwords often typed where they might be recorded as login name, in other contexts, etc.
- Ask the user: very common with some public access services
- Defenses
- For trial and error at login: dropping or back-off
- For thwarting dictionary attacks: salting
- One-Time Password
- Password is valid for only one use
- May work from list, or new password may be generated from old by a function or a hardware token
- Challenge-response systems
- Computer issues challenge, user presents response to verify secret information known/item possessed
- Example operations: f(x) = x+1, random, string (for users without computers), time of day, computer sends E(x), you answer E(D(E(x))+1)
- Note: password never sent over network
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably effective), retinal scans, etc.
- Location
- Bind user to some location detection device (human, GPS)
- Authenticate by location of the device
- Multi-factor authentication