Lecture 17 Outline
Reading
:
text
, §12, 13
Due
: Homework 4, on May 26
Greetings and felicitations!
Discussion question
SSL
How the program works
Heartbleed
Poodle
Comparison with TLS
Attacks
Exhaustive search: password is 1 to 8 chars, say 96 possibles; it’s about 7×10
16
Inspired guessing: think of what people would like (see above)
Random guessing: can’t defend against it; bad login messages aid it
Scavenging: passwords often typed where they might be recorded as login name, in other contexts, etc.
Ask the user: very common with some public access services
Password aging
Pick age so when password is guessed, it’s no longer valid
Implementation: track previous passwords vs. upper, lower time bounds
Ultimate in aging: One-Time Password
Password is valid for only one use
May work from list, or new password may be generated from old by a function
Challenge-response systems
Computer issues challenge, user presents response to verify secret information known/item possessed
Example operations:
f
(
x
) =
x
+1, random, string (for users without computers), time of day, computer sends
E
(
x
), you answer
E
(
D
(
E
(
x
))+1)
Note: password never sent on wire or network
Biometrics
Depend on physical characteristics
Examples: pattern of typing (remarkably effective), retinal scans, etc.
Location
Bind user to some location detection device (human, GPS)
Authenticate by location of the device
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 153, Computer Security
Version of May 25, 2016 at 11:38PM
You can also obtain a PDF version of this.