Outline for October 18, 2021
Reading
:
text
, §13
Due
: Homework 2, due October 20
Privacy-enhanced email
Authentication
Validating client (user) identity
Validating server (system) identity
Validating both (mutual authentication)
Basis: what you know/have/are, where you are
Passwords
Problem: common passwords, easy to guess passwords
Best: use passphrases: goal is to make search space as large as possible, distribution as uniform as possible
Attacks
Exhaustive search
Guessing
Scavenging: passwords often typed where they might be recorded as login name, in other contexts, etc.
Ask the user: very common with some public access services
Defenses
For trial and error at login: dropping or back-off
For thwarting dictionary attacks: salting
One-Time Password
Password is valid for only one use
May work from list, or new password may be generated from old by a function or a hardware token
Challenge-response systems
Computer issues challenge, user presents response to verify secret information known/item possessed
Example operations:
f(x) = x+1
, random, string (for users without computers), time of day, computer sends
E(x)
, you answer
E(D(E(x))+1)
Note: password never sent over network
Biometrics
Depend on physical characteristics
Examples: pattern of typing (remarkably effective), retinal scans, etc.
Location
Bind user to some location detection device (human, GPS)
Authenticate by location of the device
Multi-factor authentication
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 235A, Computer and Information Security
Version of October 18, 2021 at 5:31sPM
You can also obtain a PDF version of this.