sequence authentication

advertisement
Notes for 9/10/2015
Tanner Hall

Identifiers

Public knowledge

Passwords are private

Something I know

Something I posses

Like a debit card

Smart Card




Challenge response system

Problem, someone can steal them
Biometrics
How to protect against remote authentication

Random numbers

Attacks
Eavesdropping


Passively listens
Replay attacks


Dynamic one time password
Something I do



Something I am


Has a micro processor
Replays an authentication sequence
Memory Cards

Can store but do not process data

Most common is the magnetic stripe card

Provides more security with pin number
Smart Cards

Include an embedded microprocessor



Manual interfaces include a keypad and display for interaction

Classified

Static

Time bases

Password
Biometric Authentication

Pattern recognition

More expensive

Characteristics used include

Face

Fingerprints

Hand geometry

Retinal pattern

Iris

Most accurate

Most expensive

Signature

Voice

Least expensive

Lease accurate'
Remote User Authentication

Generally rely on some form of a challenge response to counter threats

Threats

Eavesdropping

Replay attacks

Trojan Horse

Client attacks

Host attacks

Denial of service
Download