Outline for March 6, 2002
Reading:
§12.2.3-12.6, §14
-
Greetings and Felicitations
-
Puzzle of the day
-
Password aging
-
Pick age so when password is guessed, it's no longer valid
-
Implementation: track previous passwords vs. upper, lower time bounds
-
Ultimate in aging: One-Time Password
-
Password is valid for only one use
-
May work from list, or new password may be generated from old by a function
-
Example: S/Key
-
Challenge-response systems
-
Computer issues challenge, user presents response to verify secret information known/item possessed
-
Example operations:
f(x) =
x+1, random, string (for users without computers), time of day, computer sends
E(x), you answer
E(D(E(x))+1)
-
Note: password never sent on wire or network
-
Attack: monkey-in-the-middle
-
Defense: mutual authentication
-
Biometrics
-
Depend on physical characteristics
-
Examples: pattern of typing (remarkably effective), retinal scans, etc.
-
Location
-
Bind user to some location detection device (human, GPS)
-
Authenticate by location of the device
-
Identity
-
Principal and identity
-
Users, groups, roles
-
Identity on the web
-
Host identity: static and dynamic identifiers
-
State and cookies
-
Anonymous remailers: type 1 and type 2 (mixmaster)