Dr. Panagiotis Rizomiliotis
Dr. Panagiotis Rizomiliotis
Dr. Panagiotis Rizomiliotis
Panagiotis Rizomiliotis
1.
2.
Password: snoopy1
Mothers maiden name: jones
Pets name: snoopy
3.
Impersonation
Malicious insiders
Eavesdropping
Keyboard sniffers
Network sniffers
Trojan horses
Alice
Im Alice
challenge R
Z=f(K,R)
response Z
Bob
K = shared key
Z=?f(K,R)
Problems?
Alice
Im Alice, f(K,timestamp)
Bob
Problems?
10
Alice
Bob
Im Alice
R
[R]Apriv
Alice
Alice proves to Bob
she has her private
key by returning R
Im Alice
Bob
[R]Apub
R
[R]Ax = R signed with
Alices x key, where x is
private (priv) or public
11
(pub) key
First case:
Can send anything to Alice as R and get Alice to
sign it
Second case:
Intercepted an encrypted message for Alice, send it
and get Alice to decrypt it
12
13
Alice
Im Alice
Bob
R1
f(K,R1)
R2
f(K,R2)
14
Im Alice, R2
Bob
R1, f(K,R2)
f(K,R1)
15
Reflection attack:
Trudy
Doesnt
know K so
cant send
f(K,R1)
Im Alice, R2
Bob
R1, f(K,R2)
Trudy
Now use
f(K,R1) in
above attempt
Im Alice, R1
Bob
R3, f(K,R1)
16
Solutions:
Separate keys for each direction
Requirements on R values: odd in one direction, even in the other,
concatenate with senders name
17
Alice
Im Alice
Bob
R1
R2, f(K,R1)
f(K,R2)
Now Bob would have to reuse R1 in order for
Trudy, who eavesdrops, to be able to use
f(K,R1)
18
Alice
Im Alice, f(K,timestamp)
Bob
f(K,timestamp+1)
Alice
Im Alice, [R2]Bpub
Bob
[R1]Apub, R2
R1
20
21
22
PassWords
23
24
25
Filing System
Clear text
Encrypted
Hashed
Salted Hash
26
27
28
29
30
31
Disclosure
Voluntary disclosure of information
Inadequate guarding of system passwords
Inference
Known pattern to creation of passwords
Use of generated passwords with predictable algorithm
Exposure
Accidental release of password
Loss
Forgetting to remember passwords
Can lead to creation of easy passwords
32
Snooping/Eavesdropping
Guessing
Keyloggers
Network sniffing (intercepting of network
communication where a password is submitted)
Limited amount of choices which can be figured
out through process of elimination
Use of blank/common passwords, passwords
which can be figured out by knowing name of
relatives, pets, etc.
Cracking
Automated guessing
33
34
Dictionary Attack
Hybrid Attack
35
Passwords
Cracking Protection - Salting
This means that the same string will hash to different values at different
times
Users with same password have different entries in the password file
Salt is stored with the other data as a complete hash
Hacker has to get the salt add it to each possible word and then
rehash the data prior to comparing with the stored password.
36
The
37
Single sign-on
38
Password complexity
Case-sensitivity
Use of special characters, numbers, and both upper and
lower-case letters
Minimum length requirements
Security questions
Virtual keyboard
39
Graphical passwords
40
Other examples
41
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
43
Tokens
Smart cards
RFID
44
Examples
RSA
VASCO Digipass
Repeatedly encrypt
Continuously update every x seconds
Update each time user presses button
45
Cost
Non-standard algorithms
46
47
48
A smart card:
can store data (e.g. profiles, balances,
personal data)
provides cryptographic services (e.g.
authentication, confidentiality, integrity)
is a microcomputer
is small and personal
Anne Doe
is a secure device
1234 5678 8910
49
Communication
Entertainment
Retail
Transportation
Health care
Government
E-commerce
E-banking
Education
Office
50
Retail
Sale of goods
Communication
using Electronic Purses, Credit / Debit
GSM
Vending machines
Payphones
Loyalty programs
Tags & smart labels
Entertainment
Transportation
Public Traffic
Parking
Road Regulation (ERP)
Car Protection
Pay-TV
Public event access
control
51
Healthcare
Insurance data
Personal data
Personal file
sale of information
sale of products
sale of tickets,
reservations
Government
Identification
Passport
Driving license
E-commerce
E-banking
access to accounts
to do transactions
shares
52
Educational facilities
Office
Physical access
Network access
Physical access
Network access
Time registration
Secure e-mail & Web
applications
53
CPU
Central Processing
Unit:
heart of the chip
54
security logic:
CPU
security
logic
detecting abnormal
conditions,
e.g. low voltage
55
CPU
serial i/o
interface:
contact to the outside world
security
logic
serial i/o
interface
56
CPU
test
logic
test logic:
self-test procedures
security
logic
serial i/o
interface
57
CPU
test
logic
ROM
security
logic
ROM:
card operating system
self-test procedures
typically 16 kbytes
future 32/64 kbytes
serial i/o
interface
58
CPU
security
logic
test
logic
RAM:
ROM
RAM
serial i/o
interface
59
CPU
test
logic
ROM
security
logic
serial i/o
interface
RAM
EEPROM
EEPROM:
cryptographic keys
PIN code
biometric template
balance
application code
typically 8 kbytes
future 32 kbytes
60
databus
CPU
test
logic
ROM
security
logic
serial i/o
interface
RAM
databus:
connection between elements
of the chip
8 or 16 bits wide
EEPROM
61
CLK
RFU
RST
Vcc
GND
RFU
Vpp
I/O
62
Dedicated terminals
Usually with a small screen,
keypad, printer, often also
have biometric devices such
as thumb print scanner.
63
Password
Card holders protection
Biometric information
Persons identification
64
Biometrics
65
Simple:
Verification Is this who he claims to be?
Identification who is this?
Advanced:
Detecting multiple identities
Patrolling public spaces
66
Convenient
Passwords are not user-friendly
Perceived as more secure
May actually be more secure
May be useful as a deterrent
Passive identification
However:
Strict regulatory frame (thats good!!!)
False positive
The key doesnt change!!!!!!!!!!
67
68
69
70
Big problems:
Biometrics are noisy
Need for error correction
71
Fingerprints
Retina Prints
Face Prints
DNA Identification
Voice Prints
Palm Prints
Handwriting Analysis
Etc
72
73
A live acquisition of a
persons fingerprint.
Image Acquisition Image
Processing Template
Creation Template
Matching
Acquisition Devices:
Glass plate
Electronic
Ultrasound
74
Strengths:
Weaknesses:
Attacks:
Defenses:
75
Based on video
Images
Templates can be
based on
previouslyrecorded images
Technologies:
Eigenface Approach
Feature Analysis
(Visionics)
Neural Network
76
Strengths:
Weaknesses:
Attacks:
Surgery
Facial Hair
Hats
Turning away from the camera
Defenses:
77
78
Strengths:
Weaknesses:
Fear
Discomfort
Proprietary acquisition device
Algorithms may not work on all individuals
No large databases
Attacks:
Defenses:
79
Strengths:
Weaknesses:
Attacks:
Tape recordings
Identical twins / soundalikes
Defenses:
80
Strengths:
Weaknesses:
Machine rooms
Olympics
No negative connotations
non-intrusive
Reasonably robust systems
Accuracy is limited; can only
be used for 1-to-1
verification
Bulky scanner
81
Retina Scan
Very popular in the 1980s military; not used much
anymore.
Facial Thermograms
Vein identification
Scent Detection
Gait recognition
82
RFLP - Restriction
Fragment Length
Polymorphism
Widely accepted
for crime scenes
Twin problem
83
84
85