南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)13 Human Authentication

Human authentication Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University
Human Authentication Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University

Human Authentication How do you prove to someone that you are who you claim to be? -Any system with access control must solve this problem Mechanisms: -Something the user is e.g.,fingerprint or retinal pattern,DNA sequence,unique bio-electric signals produced by the living body,or other biometric identifier ●IP address -Something the user has e.g.,ID card,security token,software token or cell phone -Something the user knows e.g.,a password,a pass phrase or a personal identification number(PIN) -Something the user does e.g.,voice recognition,signature,or gait CSE825 2
2 Human Authentication How do you prove to someone that you are who you claim to be? ─ Any system with access control must solve this problem Mechanisms: ─ Something the user is ● e.g., fingerprint or retinal pattern, DNA sequence, unique bio-electric signals produced by the living body, or other biometric identifier ● IP address ─ Something the user has ● e.g., ID card, security token, software token or cell phone ─ Something the user knows ● e.g., a password, a pass phrase or a personal identification number (PIN) ─ Something the user does ● e.g., voice recognition, signature, or gait CSE825

Basic password authentication Setup -User chooses password -Hash of password stored in password file ■Authentication -User logs into system,supplies password 一 System computes hash,compares with the hash in password file Attacks -Online dictionary attack Guess passwords and try to log in -Offline dictionary attack Steal password file,try to find p with hash(p)in file CSE825 3
3 Basic Password Authentication Setup ─ User chooses password ─ Hash of password stored in password file Authentication ─ User logs into system, supplies password ─ System computes hash, compares with the hash in password file Attacks ─ Online dictionary attack ● Guess passwords and try to log in ─ Offline dictionary attack ● Steal password file, try to find p with hash(p) in file CSE825

UNIX Password System Uses DES encryption as if it were a hash function 一 Encrypt NULL string using password as the key Truncates passwords to 8 characters! low-order 7 bits of each character is used to form the 56-bit DES key -Artificial slowdown:run DES 25 times Problem:passwords are not truly random -With 52 upper-and lower-case letters,10 digits and 32 punctuation symbols,there are 948~6 quadrillion possible 8-character passwords -Humans like to use dictionary words,human and pet names 1 million common passwords 4
4 UNIX Password System Uses DES encryption as if it were a hash function ─ Encrypt NULL string using password as the key ● Truncates passwords to 8 characters! ● low-order 7 bits of each character is used to form the 56-bit DES key ─ Artificial slowdown: run DES 25 times Problem: passwords are not truly random ─ With 52 upper- and lower-case letters, 10 digits and 32 punctuation symbols, there are 948 ≈ 6 quadrillion possible 8-character passwords ─ Humans like to use dictionary words, human and pet names ≈ 1 million common passwords

Dictionary Attack-some numbers Typical password dictionary -1,000,000 entries of common passwords people's names,common pet names,and ordinary words -Suppose you generate and analyze 10 guesses per second This may be reasonable for a web site;offline is much faster -Dictionary attack in at most 100,000 seconds =28 hours,or 14 hours on average If passwords were random -Assume six-character password Upper-and lowercase letters,digits,32 punctuation characters 689,869,781,056 password combinations. Exhaustive search requires 1,093 years on average To prevent using one dictionary to crack many passwords,Unix uses the idea of salt:usernamelsaltMD(salt,password) CSE825 5
5 Dictionary Attack – some numbers Typical password dictionary ─ 1,000,000 entries of common passwords ● people's names, common pet names, and ordinary words. ─ Suppose you generate and analyze 10 guesses per second ● This may be reasonable for a web site; offline is much faster ─ Dictionary attack in at most 100,000 seconds = 28 hours, or 14 hours on average If passwords were random ─ Assume six-character password ● Upper- and lowercase letters, digits, 32 punctuation characters ● 689,869,781,056 password combinations. ● Exhaustive search requires 1,093 years on average To prevent using one dictionary to crack many passwords, Unix uses the idea of salt: username|salt|MD(salt, password). CSE825

Advantage of Salt Without salt -Same hash functions on all machines Compute hash of all common strings once Compare hash with all known password hashes With salt -One password hashed 212 different ways Precompute hash file? -Need much larger file to cover all common strings Dictionary attack on known password file -For each salt found in file,try all common strings CSE825 6
6 Advantage of Salt Without salt ─ Same hash functions on all machines ● Compute hash of all common strings once ● Compare hash with all known password hashes With salt ─ One password hashed 212 different ways ● Precompute hash file? – Need much larger file to cover all common strings ● Dictionary attack on known password file – For each salt found in file, try all common strings CSE825

Passwords in the Real World [PasswordResearch.com] From high school pranks... -Student in Tyler changes school attendance records 一 Students in California change grades Different authentication for network login and grade system,but teachers were using the same password (very common) ■..to serious cash -English accountant uses co-workers'password to steal $17 million for gambling ...to identity theft -Helpdesk employee uses passwords of a credit card database to sell credit reports to Nigerian scammers 7
7 Passwords in the Real World From high school pranks… ─ Student in Tyler changes school attendance records ─ Students in California change grades ● Different authentication for network login and grade system, but teachers were using the same password (very common) …to serious cash ─ English accountant uses co-workers’ password to steal $17 million for gambling …to identity theft ─ Helpdesk employee uses passwords of a credit card database to sell credit reports to Nigerian scammers [PasswordResearch.com]

Passwords and Computer Security First step after any successful intrusion:install sniffer or keylogger to steal more passwords Second step:run cracking tools on password files Usually on other hijacked computers In Mitnick's "Art of Intrusion",8 out of 9 exploits involve password stealing and/or cracking -Excite@Home:usernames and passwords stored in the clear in troubleshooting tickets -"Dixie bank"hack:use default router password to change firewall rules to enable incoming connections 8
8 Passwords and Computer Security First step after any successful intrusion: install sniffer or keylogger to steal more passwords Second step: run cracking tools on password files ─ Usually on other hijacked computers In Mitnick’s “Art of Intrusion”, 8 out of 9 exploits involve password stealing and/or cracking ─ Excite@Home: usernames and passwords stored in the clear in troubleshooting tickets ─ “Dixie bank” hack: use default router password to change firewall rules to enable incoming connections

Password Security Risks Keystroke loggers -Hardware KeyGhost,KeyShark,others -Software(spyware) Shoulder surfing Same password at multiple sites Broken implementations Social engineering 9
9 Password Security Risks Keystroke loggers ─ Hardware ● KeyGhost, KeyShark, others ─ Software (spyware) Shoulder surfing Same password at multiple sites Broken implementations Social engineering

Default Passwords Examples from Mitnick's“Art of Intrusion” -U.S.District Courthouse server:“public?”/“public?” -NY Times employee database:pwd last 4 SSN digits -"Dixie bank":break into router(pwd="administrator"),then into IBM AS/400 server(pwd-"administrator"),install keylogger to snarf other passwords ●“g9%of people there used‘password123'as their password' 10
10 Default Passwords Examples from Mitnick’s “Art of Intrusion” ─ U.S. District Courthouse server: “public” / “public” ─ NY Times employee database: pwd = last 4 SSN digits ─ “Dixie bank”: break into router (pwd=“administrator”), then into IBM AS/400 server (pwd=“administrator”), install keylogger to snarf other passwords ● “99% of people there used ‘password123’ as their password
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)12 Secure Socket Layer(SSL)、TLS(Transport Layer Security).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)11 Public-Key Infrastructure.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)10 Kerberos.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)09 Authentication Using Symmetric Keys.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)08 Authentication Using Asymmetric Keys.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)07 Hashes and Message Digests.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)06 Number Theory.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)05 Asymmetric Key Cryptography.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)04 Advanced Encryption Standard(AES).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)03 Symmetric Key Cryptography.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)02 Security Principles.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)01 Introduction(戴海鹏).pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 09 图形用户界面的设计与实现.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 08 数据结构与算法.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 07 Java 工具类.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 06 继承与多态.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 05 Java 类.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 05 Java 类.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 04 Java 语言基础.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 03 Java 编程入门.ppt
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)14 Buffer Overflow Attacks.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)15 Bloom Filters and its Variants.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)16 Bloom Filter for Network Security.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)17 Web Security(Cookies and Cross Site Scripting,XSS).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)18 Web Security(SQL Injection and Cross-Site Request Forgery).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)19 Firewall Design Methods.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)MPI A Message-Passing Interface Standard(Version 2.2).pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)An Asymmetric Distributed Shared Memory Model for Heterogeneous Parallel Systems.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Software and the Concurrency Revolution.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Some Computer Organizations and Their Effectiveness.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Optimization Principles and Application Performance Evaluation of a Multithreaded GPU Using CUDA.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Program Optimization Space Pruning for a Multithreaded GPU.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Single-pass Parallel Prefix Scan with Decoupled Look-back.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)NVIDIA Parallel Prefix Sum(Scan)with CUDA(April 2007).pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Methods of conjugate gradients for solving linear systems.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)NVIDIA CUDA C Programming Guide(Design Guide,June 2017).pdf
- 电子科技大学:《GPU并行编程 GPU Parallel Programming》课程教学资源(课件讲稿)Lecture 01 Introduction To Cuda C.pdf
- 电子科技大学:《GPU并行编程 GPU Parallel Programming》课程教学资源(课件讲稿)Lecture 02 CUDA PARALLELISM MODEL.pdf
- 电子科技大学:《GPU并行编程 GPU Parallel Programming》课程教学资源(课件讲稿)Lecture 03 MEMORY AND DATA LOCALITY.pdf
- 电子科技大学:《GPU并行编程 GPU Parallel Programming》课程教学资源(课件讲稿)Lecture 04 Performance considerations.pdf