2011 The Practicality of Changing Default Authentication Mechanisms: Applied in a Workstation Environment Evaluation of the feasibility in having cheap and secure authentication systems to replace passwords as the new de facto standard. Shawn Williams REA 820 April 5, 2011 Table of Contents Introduction .................................................................................................................................... 5 Purpose ........................................................................................................................................... 6 Systems covered ............................................................................................................................. 6 Personal Motivation........................................................................................................................ 6 Where Did the Data Come From?................................................................................................... 8 What Kind of Information would be used for this Study? .............................................................. 8 Why do security systems in general, fail?....................................................................................... 8 Why should we stop using password based authentications for ................................................... 9 productivity environments?............................................................................................................ 9 Other popular beliefs I’ve have come across include; .............................................................. 11 Criteria of Evaluation .................................................................................................................... 12 Authentication Systems ................................................................................................................ 15 Chapter 1: Graphical Passwords .................................................................................................. 16 Introduction .............................................................................................................................. 16 How does the Technology Work? ............................................................................................. 17 Passfaces ................................................................................................................................... 18 Other Highlights ........................................................................................................................ 19 Pros (Passfaces)......................................................................................................................... 20 Cons (Passface) ......................................................................................................................... 21 Ranking based on criteria ......................................................................................................... 21 Click-Based Graphical Password authentication ...................................................................... 23 Pros(Clickpoints) ....................................................................................................................... 24 Cons(Clickpoints)....................................................................................................................... 25 Future Outlook and Conclusion of Graphical Passwords ......................................................... 26 Chapter 2: Biometrics .................................................................................................................. 27 Introduction .............................................................................................................................. 27 How does the Technology Work? ............................................................................................. 28 Necessary Components ............................................................................................................ 28 Finger Print Recognition ........................................................................................................... 29 How Finger Print Scanners Work? ........................................................................................ 30 Three Types of Finger Print Biometrics: Optical, Capacitance, & Ultrasonic ....................... 30 Pro (Optical) .......................................................................................................................... 30 2|Page Cons (Optical) ........................................................................................................................ 30 Pros (Capacitance) ................................................................................................................ 32 Cons (Capacitance)................................................................................................................ 32 Pros (Ultra Sonic) .................................................................................................................. 33 Con (Ultra Sonic) ................................................................................................................... 33 Ranking based on criteria ..................................................................................................... 33 Face Recognition ....................................................................................................................... 35 Introduction .......................................................................................................................... 35 How It Works?....................................................................................................................... 35 Pros (Face Recognition) ........................................................................................................ 36 Cons (Face Recognition)........................................................................................................ 36 Ranking Based on Criteria ..................................................................................................... 37 Personal Experience with Using this Technology ................................................................. 38 Retina Scan................................................................................................................................ 39 Introduction .......................................................................................................................... 39 How Does It Work? ............................................................................................................... 39 Pros (Retina).......................................................................................................................... 40 Cons (Retina) ......................................................................................................................... 41 Ranking Based on Criteria ..................................................................................................... 41 Typing Rhythm .......................................................................................................................... 42 Introduction .......................................................................................................................... 42 How Does it Work ................................................................................................................. 43 Pros (Typing Rhythm) ............................................................................................................ 43 Cons (Typing Rhythm) ........................................................................................................... 44 Ranking Based on Criteria ..................................................................................................... 44 Future Outlook and Conclusion For Biometrics ........................................................................ 45 Chapter 3: Token Based Authentication ...................................................................................... 46 Introduction .............................................................................................................................. 46 How does the Technology Work? ............................................................................................. 46 Hardware Token Breakdown .................................................................................................... 47 Disconnected Tokens ............................................................................................................ 47 Pros (Disconnected Tokens).................................................................................................. 48 Cons (Disconnected Tokens) ................................................................................................. 49 3|Page Ranking Based on Criteria ..................................................................................................... 49 Connected Tokens................................................................................................................. 52 Pros (Connected Tokens) ...................................................................................................... 53 Cons (Connected Tokens) ..................................................................................................... 53 Ranking Based on Criteria ..................................................................................................... 54 Contactless Tokens ............................................................................................................... 57 Pros (Contactless Tokens) ..................................................................................................... 57 Cons (Contactless Token) ...................................................................................................... 57 Ranking Based on Criteria ..................................................................................................... 58 Typical Life Cycle of a Token ..................................................................................................... 59 Various Vendors and Types of Token Based Solutions ............................................................. 60 Future Outlook and Conclusion For Token Based Security .................................................. 60 Interpreting the Results ................................................................................................................ 61 Conclusion ..................................................................................................................................... 62 Glossary ......................................................................................................................................... 62 Work Cited .................................................................................................................................... 65 4|Page Introduction Password based authentication is without a doubt one of the oldest forms of authentication. Within the IT Sector, we are often reminded of all the flaws that are associated with the username and password, and although many good suggestions have been made to introduce strong infrastructure polices that enforces strong security, because they are designed from the prospective of the designer, and because they don’t normally have the users’ needs in mind, these tactics are usually subverted by end users trying to get better usability out of these systems. For this reason, it is often very difficult to find a balance between usability and security, and combined with the fact that most users simply do not understand how password cracking works, I believe that with all the alternative authentication solutions out there, it is 5|Page finally come time to scrap password use in workstation environments and move on to more current technologies. [20][21] Purpose In this study, we will begin to explore various authentication systems and see if it is possible for any one of them to be deemed good enough to be able to replace the current password mechanisms used in most systems today, thus paving the path for becoming the new de facto standard for both home and industry wide authentication. Systems covered Biometrics (finger print, iris, face recognition) Rhythm\gait based passwords Graphical based passwords Hardware Tokens Personal Motivation As a student of IT security, we are always being told by our instructors the adherent flaws of password authentication. The attack vectors range anywhere from the sophisticated stealthy deployment of key loggers, to the low tech and popular shoulder snooping. Yet despite that, and because of the relative simplicity of this form of authentication, in terms of its deployment, it is still widely used as the default standard for authentication. Personally, I’ve always wondered why password authentication was still the default standard despite the fact 6|Page that there were many new and more secure systems emerging and because of this, I wanted to find out on whether or not it is even practical to replace password authentication with that of something better. My first approach towards the goal of finding the perfect authentication system was one that would involve choosing a random system based on initial assumptions and evaluating it on the bases of its strengths over password security. In the earlier phases, I was under the assumption that any form of authentication would be superior to password authentication and as such, I decided to take up ‘graphical passwords’ after hearing about them for a first time in a lecture. The system seemed interesting at first because it was new to me, and as such, I started researching it. However, in the end, as I learned more of its strengths and weakness, I found that the weakness exceeded the strengths, and while it may have been possible to fix the systems with carefully placed modification, the catering that it seemed to required would have been too much trouble, and thus deemed this particular system impractical to use in a real world scenario because of the fact that the average user would not or could not make the necessary modification to make it work. [14] After that finding some, suggested to look into biometrics as a possible solution, but having experienced flaws of this form of authentication first hand, (since my XPS M1330 has a built in fingerprint reader) I decided to abandon the idea of arbitrarily choosing one good authentication system and modding it to meet the demands necessary to making it work as a successor to password authentication, to the more realistic approach of analyzing the many systems and drawing up a conclusion based on its current setup with little modification. 7|Page Where Did the Data Come From? Data presented here was collected entirely from secondary sources helped me in determining the feasibility of a particular system. Problems addressed were being taken into consideration. In addition, some of the relevant information was taken from various security related books. The scaling system, that will be introduced later, though entirely a work of my own creation was influenced by a combination of the overall consensus of my reading, as well my own knowledge. What Kind of Information would be used for this Study? Mostly information regarding the various systems, their pros and cons in addition to information related to their cost in deployment. This paper will revolve around the search for an effective authentication system to replace string based passwords, so anything that can be used to prove one form of authentication over another was of use. Why do security systems in general, fail? When it comes to security, there are more than one mental model that comes into play they include; a) Design model--the security model from the designers’ perspective and how it should interact with the user and the system. It is the belief on how the system should work in a perfect world. b) User’s mental model--the model in which how the user of the system believes the security system to work, based on assumptions. The model differs from user to user, some and some users have grossly inaccurate assumptions. 8|Page c) system model--the actual way the system works. The main reason why security systems fail is because users and designers view security completely differently. The policy designer usually has only security in mind and thus is solely concerned with security and disregards usability. The end user lacks knowledge or has completely wrong idea on how security systems work and how hackers exploit weakness in the system, so in tern they ignore security or attempt to bypass the policies in place in order to get access to resources faster. [1][2][33] Why should we stop using password based authentications for productivity environments? There was various support and opposition against password based authentication that has prompted me to look at the possibility for change as well as more than one school of thought in terms of where authentication security is going. Some negative aspects of password based security that seemed to be common amongst other password related papers included these; 1. There is a problem in finding balance between usability and security. [20][3] a) People use the same passwords everywhere [20] b) People use common dictionary words and password that are too simple [20] c) Enforcing strong password policies may force users to write them down [20] 2. Passwords can easily be told to others. 3. Passwords are easy to copy. 4. There are many widely available tool of decrypting stored password information. 9|Page 5. Passwords can be captured easily during input time. 6. There are weaknesses in password reset mechanisms that hackers may be able to exploit. 7. Passwords are the weakest link into any system 8. The same passwords are constantly being reused for different systems. [21] There were also a few articles that tried to predict where authentication would be going in the future. Since for my purpose, I want to find a single solution (best case scenario) for a replacement for password authentication, I will likely need to first evaluate these individual groups that have been identified. For example, one article expresses a belief that future authentication systems will move from so called ‘knowledge based’ (e.g. password based authentication) authentication to ‘memory based’ authentication (e.g. graphical passwords). The rationale behind this was that the major weakness to knowledge based authentication like passwords was that users were simply incapable of retaining over 5 different passwords and thus fixed this problem by either, writing it down, disclosing it to others, or using the same password universally across systems. As such, the authors felt the solution would be to find or develop systems that promoted users ability to memorize. At the same time the new system had to be strong enough to prevent attackers from using brute force, educated guessing or other means of by-passing security. The study then proceeded in the evaluation of the memorably of three systems; 1. Picture Recognition Technologies (AKA graphical passwords) 2. Pseudo-word recognition (same as graphical passwords except user is presented a series of pseudo words e.g. ' kould' from various selection screens. 10 | P a g e 3. Artificial grammar learning (a system that requires user to memories a pattern or string of characters. e.g. JKGWYY In the end of the study, recognition technology was proven easier for users to remember and was declared the ideal solution. [3] In another similar study, the same kind of argument concerning memorability was brought up, but this time, placed it in the context of finding a memory-based system to replace PIN numbers at ATM machines. Since workstations at work have a similar degree of data sensitivity when it come to protecting data, it makes sense to think that what can be applied to ATM’s can also be applied to workstation pc’s. In this particular study, similar memory tests were conducted over a period of one month in which users using three different kinds of memory based authentication systems (and one using traditional PIN numbers) were required to memorize five passwords. Once again, graphical passwords proved superior in terms of password retention by users of the group who were given a graphical password to memorize. [4] However, though the arguments for memory based password seemed strong, in another article, it was challenged by 2 other papers that brought up the notion that ‘if the user can easily memorize graphical passwords, so could the shoulder surfer’. [5][6] Other popular beliefs I’ve have come across include; Authentication is better handled behind the scenes and should be nearly automated since user interaction is a greatest weakness to the system. [8] Multi-factor authentication, VS single-sign on [7] [8] My approach to finding the answers to this problem is to continue to find articles pro, and 11 | P a g e against any given technology or generalized belief and then analyze each solution based on my own criteria based on some things I found to be common sense, as well as idea’s I’ve picked up from various readings. The criteria I will be using is the one given below. Each technology will likely be given a rating out of 10 based on observation and what I find. What is the Outcome and how will this Research Benefit Others? If I am able to find and isolate a technology that is good enough to replace passwords, business owners would no longer have to run the risk of deploying risky technology they are unfamiliar with. Even if several items tie, at least by evaluating the strengths and weaknesses of each technology (as presented in the research) business owner’s can find a system that best fits their needs. I’m not sure yet but I may actually do this kind of analysis myself. Criteria of Evaluation In order to determine rather or not a particular authentication method would be deemed a worthy candidate towards succeeding passwords as the standard authenticating agent, it is first necessary to developed an ideal criteria to ranking each technology, and after undergoing much research, the following categories have been identified and established, based on key attributes that could be considered most desirable among workstation users and IT staff alike when selecting a new system. These categories include; 1. Number of security holes 2. Cost 3. Ease of Use 12 | P a g e 4. Increase in Security 5. Scalability 6. Practicality of implementation and modding 7. Access and availability (how easy is it to obtain) From the 7 categories above, the various systems will then be ranked out of 10 accordingly for a total of 70 points. The following chart below further explains and describes set features that would grant various systems a more generalized ranking of what would be considered, a low score, a medium score and a high score. In the end, only systems with and overall score of 53 or higher across all categories will be considered for being a likely candidate for selection. Number of Security Holes Exploitable Score High 0-3 Medium 4-7 Low 8-10 Cost Score High 0-3 13 | P a g e Number of security holes exceed the threshold of what could be considered acceptable and the authentication system has more holes then password based security. Number of Security holes only marginally improve over number of exploitable password related holes. Very few exploitable holes and massive improvement over password security High maintenance installation costs and Medium 4-7 Low 8-10 Ease of use Score Low 0-3 Medium 4-7 High 8-10 Practicality Score Low 0-3 Medium 4-7 High 8-10 14 | P a g e Cost of fully installing and maintaining system is either high in maintenance fees or high in installation but not both. Cost of fully installing and maintaining system is minimal. System is so complicating that most users will attempt to bypass it in order to speed up work production. System has a medium level of complexity that can be tolerated by most users. Daily usage of security mechanism is easy to use by most users with business level computer skills. The system is complex to troubleshoot if broken and difficult to mod and requires major changes to in fracture to use. System has a medium level of setup complexity and can be workable with effort. Small change to existing in fracture may be required. System is flexible, easy to install with current technologies and quick to set up. No change to infrastructure mainly out of the box solution. Scalability Score Low 0-3 Medium 4-7 High 8-10 Increase Security Score Low 0-3 Medium 4-7 High 8-10 Access and Availability Score High 8-10 Medium 4-7 Low 0-3 Authentication Systems 15 | P a g e System is only meant to be installed on network size it supports and either does not provide room for growth or too elaborate to be practical on smaller systems. System has a workable level of flexibility but generally can’t handle extremes. System is highly flexible and can be implemented with ease on networks of any size. System provide little or no security advantage over password security. System provides some security advantages over password security. System is much more secure then password authentication. Found in any office or computer store. Implementation exists but special orders need to be made. Only exists in theory or is a prototype so development overhead is need to make the solution. Now that the baseline on what the goals are of this paper, in the next few Chapters, we will take a look at various authentication systems and in the end we should eventually have a good idea on what systems will be good for the purposes outlined here by using the quantitative graph above and my own critical analysis as a guide. Chapter 1: Graphical Passwords Introduction Traditionally, passwords have been used for years and they usually were made up of a secret string of chars that would be prompted by a systems login screen when ever authentication was required to access some kind of secured resource. For a long time, this had been adequate enough in environments where people only had to Figure 1.0.0–Problem with Passwords [20] memorize a single combination usernames and passwords. of However, today’s world is different such that many of us now need to memorize many sets of user-password combinations, forcing users to shy away from using secure practices and doing things like creating overly simplistic passwords and using the same passwords for multiple systems. As such, system administrators responded by creating strict password policies which forced users to create user unfriendly passwords in which they usually forgot. 16 | P a g e For these reasons, users often debunked to the even less secure practice of writing things down. This generally seemed to be the common problem with traditional passwords, so while searching for solutions, graphical passwords seemed to be a good place to start since it plays on the human’s natural ability to more easily remember pictographically images over, texts, numbers and symbols and as mentioned earlier, it has been a common belief by many experts that security can be solved if a system is developed that plays on the humans ability to memorize. Such systems as a whole are often regarded as memory based authentication systems. In this first writing, we will look at and examine how various flavours of graphical passwords work, their strengths and weaknesses, and finally, we will rank it accordingly to see if it would make a good replacement for the current text based password system. [20] How does the Technology Work? In general, graphical-based authentication takes on many forms. But they usually all have the same distinguishing component in which in order for a user to initiate the authentication process, that user must ‘click’ a series of graphics, colors, or patterns as opposed to difficult to remember text, in order for authentication to take place. As I began exploring there various forms graphical based password could take place, there were two predominate forms I discovered, and for the purpose of this report and because of the fact that all other systems seem to have stemmed off these dominate two, I will only talk about its most common iterations. The first being often referred to as “Passfaces”, which uses the theory that human beings are more easier able to memorize a persons’ face then other forms of pictures or even names. (If you really think about it, when you first meet someone new, you never memorize their name right away, their face however is often difficult to forget). The second type is the 17 | P a g e initial and first graphical based authentication system developed by unnamed computer science researchers at Rutgers University-Camden. In this version of the system, users authenticate themselves by clicking on certain points on a picture in sequential order only the user knows. Passfaces This is most likely the most marketed and predominate form of graphical based authentication today mostly because of its great support for Windows systems. As mentioned earlier, is makes the use of a series of randomized faces, in which the user sets up as a password in order to make up the Passface. The faces are usually randomly selected from a large bass of hundreds of faces. But only 9 are displayed on a screen at a time in which the user selects a single face. Once the user selects and clicks on a face, the screen refreshes and a new host of nine faces are randomly fished out from the much larger pool of faces, a few (1 or 2 faces will always be from the users selected Passface). Figure 1.0.1—Passfaces on phone [25] The user then clicks on his/her next face in the Passface string, and this process repeats until the full Passface string is selected. If the series of selected faces match the string stored in the database, the user is granted access to the resource. [9][10] 18 | P a g e Figure 1.0.2 – Passface usage on smartphones [25] Figure 1.0.3—Typical topology of how Passfaces can replace passwords in a workstation through active directory. [10] Other Highlights Workstation Authentication (LAN) Passfaces Client replaces Windows password logon 19 | P a g e Off-line authentication for roaming notebooks Remote Authentication (via Web browser) Integrates with Microsoft IIS (Internet Information Services) Web Server for remote (browser) access All major Web browsers supported without plug-ins or software installation Works seamlessly with "Basic Authentication" (e.g. Outlook Web Access) or forms based authentication Remote email via Outlook Web Access Applications hosted through Citrix Metaframe Custom Web Applications Intranets and Extranets [10] Pros (Passfaces) Easy implementation Solve the problem presented by users not being able to memorize passwords Works on existing technology and OS’s No possibility of lost written down passwords or authentication tokens getting in the wrong hands Support for 2-factor authentication Low cost of ownership Lower costly password reset rate 20 | P a g e Known to have greatly hammered the effects and success rate of phishing [4][5][6] Cons (Passface) Easy for others to shoulder snoop The selected predetermined image can be guessed if the preferences of the user is known. Time to complete the authentication process is slower than traditional password authentication. Due to multiple screen selection VS one and in the case of slower machines, the graphics may take time to load. If Brute force methods are developed, the number of randomized faces are lower then the number of combinations that can be created with text-based passwords. [4][5][6] Ranking based on criteria Category Score Reason Number of security holes 8 Cost 8 Ease of Use 10 Increase in Security 6 The kinds of attacks performed on graphical passwords are the same as that seen on text based passwords. Overall count of holes is less. (2-3 known holes) They include bruteforce (hard to do but possible), shoulder snooping and smart password guessing. Software solution is low as well as maintenance. The costs of password resets is also much lower then text based systems because people usually remember their Passface. Very easy to use, no computer skills or manual required. Offers improvement in areas 21 | P a g e Scalability 22 | P a g e 8 like, reduced phishing, harder to develop cracking software for, and eliminates passwords from being written down. However, one major flaw is the possibility of the success rate of shoulder sniffing increasing since memorability of faces also applies to the shoulder sniffer as well. There is also the possibility of brute force attacks. If a hacker were to find a way to brute force Passfaces, the much smaller combination of Passfaces would potentially make it possible to crack in no time. However, as of now Passface cracking is only theory and has not been done en mass yet. There was also an issue that arise where hackers were able to intelligently guess Passfaces be knowing little about the user. For example, for a 5 screen selection of faces, each with a grid 3X3, a guy may select the most attractive girl in each selection for his password. In a similar example, people are often know to select Passfaces of those the same nationality they were. As such, other then having the system automatically choose Passfaces for users, there is very little methods that can be used to enforce good password policy’s as there are with textbased passwords. E.g. in text base passwords, if users keep choosing simple passwords like ‘password’ as there login. Admins may enforce a policy to does not also dictionary words. It’s much harder to do this kind of filtering on graphics since the computer can’t interpret human faces like humans can. [4][5][10] Very scalable, works in all Practicality of implementation 8 and modding (How much change to existing infrastructure is needed) Access and Availability 7 environments and can even be applied to end devices like smart-phones and laptops. Require little change to infrastructure, and server software is readily available for Windows. Client software must also be installed on individual clients. Enterprise based software solutions are readily available but special orders must be place to acquire them. Overall Score = 55 Click-Based Graphical Password authentication The original implementation of graphical passwords relied on the user’s ability to memorize certain points on a picture in which they would click in sequence in order to authenticate themselves. These individually locations are often referred to as ‘click points’ and they can either be chosen randomly by the system, or specified by the users. This iteration also has a means of preventing and mitigating the effects of shoulder snooping. Basically, how this works is that a user clicks images within images. Example, if a user clicks on a certain shape within another shaper, though user and system recognize what image was clicked, to the should snooper, they would be confused on what shape was actually clicked, the inner or outer shape. When multiple click points are added to the equation, the difficulty in following what shape is being clicked on increase by a large order of magnitude. [16][26] 23 | P a g e Figure 1.0.4—a complex image in which a user sets a series of shapes to be used as a clickpoint Figure 1.0.5—a series of user defined clickpoints [26] Pros(Clickpoints) Solve the problem presented by users not being able to memorize passwords No possibility of lost written down passwords or authentication tokens getting in the wrong hands 24 | P a g e Support for 2-factor authentication Lower costly password reset rate Known to have greatly hammered the effects and success rate of phishing Has anti-shoulder snooping measures [16][26] Cons(Clickpoints) The selected predetermined image can be guessed if the preferences of the user is known. Time to complete the authentication process is slower then traditional password authentication. Due to multiple screen selection VS one and in the case of slower machines, the graphics may take time to load. Possible brute force tools have been created for use again single image click-based password systems Not as widely available as Passfaces May require costs allocated for development (since most click based schemes are prototypes and research projects) [16][26] Category Number of security holes Score 8 Cost 3 25 | P a g e Reason The kinds of attacks performed on graphical passwords are the same as that seen on text based passwords. Overall count of holes is less. (2-3 known holes) They include Bruteforce (hard to do but possible), and smart password guessing There are not many suits as complete and readily available for this type of graphical Ease of Use 10 Increase in Security 7 Scalability 8 Practicality of implementation 8 and modding (How much change to existing infrastructure is needed) Access and Availability 3 password technology. With that said, cost allocated for personal tuning and maybe even catered development costs may be required. Very easy to use, no computer skills or manual required. Offers improvements in areas like, reduced possibility of phishing, keyloggers, etc. Some implementations even have antishoulder snooping measures. However, this form of graphical based passwords is still susceptible to brute force clicking algorithms. Can be fit into any size system. It simply replaces the password authentication process with its own. [26] Require little change to infrastructure, and server software is readily available for Windows. Client software must also be installed on individual clients. Hard to find and mostly unavailable. Overall Score = 47 Future Outlook and Conclusion of Graphical Passwords After taking a look into both kinds of graphical passed authentication methods, I’ve come to conclude that the Passface method is superior to click-based authentication most due to the fact that it is already readily available for purchase. Though click-based authentication is likely to be more secure, I don’t think it would be wise for any company to jump in to this yet because since most of it is still in beta stages, the overall development cost does not seem to justify its two vulnerabilities VS three. Overall, both systems are very promising and scalable, 26 | P a g e they are also very easy to deploy and use and its possible for use to see more use of this technology is some shape or form in the near future. Chapter 2: Biometrics Introduction Often regarded as one of the stronger forms of authentication and one that has more recently began being implemented in many roaming devices today, Biometrics encompasses a broad scope of technologies in which provides user authentication by using the unique physical or behavioural based traits as a means of verifying who individuals are. Some forms of physical based biometric technologies include, the ever popular finger print recognition, face recognition, vascular pattern/vein geometry recognition, iris recognition, retina recognition and DNA scan identification. Some forms of behavioural based authenticating technologies include voice recognition and typing rhythm. For the purpose of this section, I will be looking into the more widely available biometric systems for each of the two categories and then proceed to identify the superior technology of the overall. Technologies that will be explored in this section of this report will include; Finger print recognition (3 subcategories based on sensor technologies) Face recognition Retina recognition Rhythm based technologies But before getting into individual systems, lets first take an overall look at how biometrics in general work an features that are shared amongst all systems. [9][11] 27 | P a g e How does the Technology Work? Although the underlining layers on all biometric based technology achieve the same functions through different means, they all encompass 3 phases in which are required to works. The three phases are; 1. Enrolment—The process of scanning and registering a unique individualist trait that will be used as an personal access key. [11][13] 2. Storage—Once the enrolment process is completed, the information scanned is converted into a digital signature which is then either stored on the device itself or on the hard disk of the system in encrypted form. [11][13] 3. Comparison—After both the enrolment of new traits is stored, authentication can now be ready to be used. During authentication, the users typically allows the scanner to analyze their individualist trait. That trait is that compared against those signature image(s) stored during enrolment. If there is a match, the user is granted authorization to the specified resource. [11][13] Necessary Components In order for the 3 phases above to be achieved, several components are also required so that those goals could be achieved. The first component needed, as mentioned earlier is the sensor. The sensor is typically used for capturing unique imprints during the enrolment phase and is usually a piece of hardware that can be integrated or an added add-on to a system. In addition, it is also used in the scanning of users who wish to authenticate themselves. The second component necessary for biometric technology to take place is the computer that 28 | P a g e stores and compares the scanned images. However, it should be noted that not all biometric devices require the PC to perform those function and may actually store enrolment images on the device instead (advantages to this would be that the stored encrypted image would be much more difficult to access the image to performing brute force cracking). And the final component required for biometric authentication to work is software that actually interacts with the sensor and storage device and performs the actual image comparison. [22] Now that the you know a bit about the generalities about biometrics overall, it’s now time to get into specifics so that we can later analyzes their strengths and weaknesses in comparison to password based security. [9][11] Finger Print Recognition Today finger print recognition is one of the most widely deployed form of biometrics authentication and in recent years has been integrated into devices such as USB thumb drives and laptops, in which much of its success in smaller scaled devices I believe may be attributed to the fact that; 1. Finger Print Biometrics is the least expensive form of biometrics 2. The small size of the scanner used for print captures. (Recall earlier that one aspect for an authentication technology to be a success is that the change must not greatly impact infrastructure of what already exists. A large sensor may have physical implication to infrastructure that may deter people from implementing the technology. ) With that said, it would be interesting to see how it would fair in a workstation environment. But first let’s look at how it works and the 3 forms this technology comes in. 29 | P a g e How Finger Print Scanners Work? There are 3 main types of scanners used in finger print biometrics and they all work in completely different way to map out the unique ridges and values in a fingerprint. [9][11] Three Types of Finger Print Biometrics: Optical, Capacitance, & Ultrasonic Optical in this implementation, the capturing of the finger print image is done by a charged coupled device (same capture technology used in digital cameras and camcorders). The CCD is essentially a collection of light-sensitive diodes that generate electrical signals in the presence of light. The light-sensitive diodes are also referred to as photosites, and each individual photosite is responsible for recording a single pixel of light. When combined together with other photosites, they merge together and form an image. In the case of the scanner used in finger print biometrics, the image captured is typically the inverted image of the human finger print. After capturing the print, the software usually attempts to clean up the image by making the ridges more defined by darkening them etc. If the image taken is too bad, the scanner would request a rescan until a desired image is captured. [17] Pro (Optical) Most readily available form of biometric technology on the market Cheaper than most other forms of biometrics Cons (Optical) Higher fault rate among competing finger print biometrics Easier to fool then Capacitance and Ultrasonic scanning [17] 30 | P a g e Capacitance scanning is another method in which the human finger print can be recorded. However, instead of using light to capture the various ridges and values that make up the print, it uses a small electrical current that is responsible for recording the depth of the ridges. Figure 2.0.0 –Capacitance Circuitry diagram [17] In the above diagram, it outlines how the sensor makes use of the values and ridges to complete a circuit. [17] “The sensor above is typically made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, with an insulating layer. The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors.” [17] The function of the amplifier is to alter a supply of voltage based on the relative voltages of two inputs, called the inverting terminal and non- 31 | P a g e inverting terminal. “The non-inverting terminal is what grounds the current, and the inverted terminal is connected to a reference voltage supply and feedback loop. The feedback loop, which is also connected to the amplifier output, includes the two conductor plates.” [17] The two conductor plates illustrated above is what form the bases of the capacitor, and the fingerprints’ surface acts as the third. Because of the fact that the valley’s in a fingerprint create pockets of air between the plates, it causes the varying distance between the capacitor plates to change in total capacitance (ability to store electrical charge). With that, the capacitor in a cell “under a ridge will always have greater capacitance than a cell under a valley.” [17] During scanning voltage output is read and depending on a cells charge the software is able to determine rather or not a surface area on the finger is a ridge are a valley. After reading all the cells underneath the finger and sensors, the processor is able to generate an image of what the fingerprint looks like. [17][9] Pros (Capacitance) the ability to measure depth makes capacitive scanners harder to fool the optical scanners. The semiconductor chip used in this technology is physically smaller then the CCD unit in optical scanners. So the overall scanner can be made more compact. [17] Cons (Capacitance) More expensive then optical sensor biometrics Ultrasonic sensors use very high frequency sound waves that bounce off the surface area of the finger and recreate the image of the prints. The technology behind this is similar to how 32 | P a g e bats use echo location in the wild to home in on food. If the refracted sound wave comes back soon, it means the object is close by. In the case of a finger print, this could mean the presence of a ridge. [9][18] Pros (Ultra Sonic) High accuracy Con (Ultra Sonic) Expensive Some people don’t like the feel of the ultrasonic waves Ranking based on criteria Category Score Reason Number of security holes 8-9.5 Cost 5-6.5 Ease of Use 7 Not many security holes aside from the fact that it may put the lives of its users in danger in such that an attacker may cut off the finger of a user to gain access to a resource. It may be possible for an attacker to somehow gain access to the stored fingerprint image and use it during authentication to login. This attack is possible with optical based finger print recognition that does not map out depth of its ridges. Dependant on the technology used. Optical being the least secure but cheapest followed by Capacitance and ultrasonic. Average level of false return rates typical of biometrics in general may irritate some 33 | P a g e Increase in Security 9 Scalability 8 Practicality of 6.5 implementation and modding (How much change to existing infrastructure is needed) Access and Availability Overall Score = 47.5 – 53.5 34 | P a g e 4-7 users. From personal experience, on may old XPS1300 laptop, using an optical scanner, it took an average of 2-3 finger swipes form me to log into Windows Vista. A finger print is also difficult to forget. Another thing which could deter the use of the technology is that users without hands or poor quality fingerprints would not be able to register a print to use. Much higher security then password based security. Because the password is a finger print, it’s impossible to share and difficult to copy. The only real problem is that if compromise does occur you can’t simply change your existing fingerprint you have. Scalability is dependent on rather or not your OS supports a particular piece of attached hardware. All forms of biometric technology may require a slight change to existing network infrastructure in that you may need to purchase the scanner and then replace usernames and passwords with fingerprint images. You will also need appropriate software. Depends on the technology. Optical scanners are found everywhere whereas ultrasonic biometric is very hard to find. Face Recognition Introduction Facial recognition is a type of biometrics technology that records distinguishing facial geometries and other key focal points on the face. Today, next to finger print biometrics, it is the second most commonly used form of biometrics used and can be found bundled in many laptops that have built in digital cameras. In the following section, we will explore how this technology works, its strengths and weakness as well as how practical it work if we were to apply it in a workstation environment. [9][13] How It Works? Facial recognition typically requires 3 components for it to function. 1. Camera (the sensor used for capture) 2. Software (responsible for mapping focal areas on the face that make it distinct) 3. Hard Drive (for storage) The camera typically takes an optical image of the face and stores the image on the storage device. A specialized camera is not required for this form of authentication to work, but a better web cam may yield lower false rejection rates obviously due to high resolution images. Once the image is taken, the underlining software takes over and lays the image out on a grid. It then maps out key points, like the distance between two eyes, size and height of forehead etc. [9] 35 | P a g e Pros (Face Recognition) Does not require any kind of specialized capture device, a simple web cam will do in which could be found for as little as $9.99 at Factorydirect. the what you have means of authentication token is universal in such that everyone has a face. Among the cheaper forms of biometric technologies. No hygiene-related health concerns since you don’t need to touch the sensor. [18] Cons (Face Recognition) The system's field of view must cover a wide range of heights, from the tallest standing user to a user in a wheelchair. Requires the user to face the camera directly during authentication and user must remember the exact facial expression and position they used during registration for authentication to proceed. Lighting must be uniform and consistent—with good front lighting and little back lighting—any change in lighting conditions will cause false rejections. This makes it hard to authenticate if lighting level were not the same as registered images. Some systems can be tricked into accepting photographs or even drawings of faces. Since the capture device is optical, it’s possible for malicious users to decapitate legit users to gain access to resource thus putting their life in danger. Likewise, an attacker could coerce a legitimate user to look at a camera to complete an authentication under duress. Optical sensor could be tricked with really detailed masks 36 | P a g e Privacy concerns since images are photos of your face easily be traced back to you without the need to compare it with anything. There are unknown accuracy rates, with a high chance of false negatives. Thus making the whole authentication process painfully longer then it should be. [18] Ranking Based on Criteria Category Score Reason Number of security holes 5 Cost 6-8.5 Ease of Use 0.5 Increase in Security 6.5 Scalability 8 Most of the holes found are related to the flaws with tricking the optical sensor. Such as, using a well modeled clay face or photograph, decapitating the individual who has access and using their face. Taking a photo of the individual and using it. Scanner (web cam can vary in price) from $9.99 – over $100. The average web came costs around $19.99. Huge false rejection rate makes this form of authentication very difficult and frustrating to use. No huge increase in security over password based security. Only that it can’t be brute forced. Very Scalable. Very software dependant. Minor to no change to infrastructure. E.g. if your workstation allows laptops to dock and connect to network that way, most laptop now come with built in webcams and thus no modification to Practicality of 8 implementation and modding (How much change to existing infrastructure is needed) 37 | P a g e hardware infrastructure would be required. Access and Availability 10 Very easy to find since any computer store or even retail stores should have a basic web cam. Overall Score = 49 – 51 Personal Experience with Using this Technology Although hardware requirements is just a standard web cam, and authentication seems simple, Face biometrics in general has an extremely high false rejection rate, much higher then the 2-3 swipe requirement for fingerprint recognition. Its so bad, and it takes so long to authenticate, (10mins or more) I usually have to default to the backup authentication method to log into Windows. Software for Face recognition usually allows you to store not just 1 imprint but an infinite number of images that can be compared against during authentication. In essence, with multiple snap shots taken of your face, the false rejection rate should be lower. However in reality, even after I took over 500 photo images of my face, the authentication process was still bad. To make matters worse, the sensitivity is so sensitive that, simply by changing chairs thus lowering or raising the position of your face, to moving your system to a different room, or even getting a haircut can completely through the system off and thus require you to register all new images. My testing was done on my laptop which can be moved around. This has the effect of causing the system to reject you because lighting and color differ in different rooms. To offset this, I re-registered my face under various conditions. 250 images in one room under bright light and 250 images under low light. Then I did the same things for other rooms. However, I eventually gave up on this because every time there was some sort of 38 | P a g e environmental change, or a change to how I looked, I needed to register all new faces. Another frustrating thing was trying to remember what position and facial expression I used during registration. I eventually defaulted to always putting on a huge and unnaturally large frown simply because even expressionless faces could be hard to remember. In a workstation like environment, even though systems would generally not be moving around, if the system is networked and you need to access a system in another room, again, lighting would be a problem. Retina Scan Introduction Often regarded as the successor to the other form of eye biometrics, retina recognition is a very accurate scanning technique that makes the use of the unique formations of blood vessels that are found within the lining of the retina located in the back of the eye; the retina is basically a lining layer of tissue around the eye that is light sensitive, and captures and interprets what the eye sees. Since the blood vessels within the retina are unique and because of the fact that the eye is not exposed to harsh conditions, it’s safe to say that most of the time, the unique patterning within the retina will remain the same for the individual for the rest of their life. [9][13] How Does It Work? As mentioned before, the blood vessels within every individuals’ retina is unique. The scanner is usually some device in which typically looks into and focuses the eye on a specific point. 39 | P a g e Then, for the next 10-15 seconds, a low intensity light would laminate the blood vessels and photograph the image reflected that is later used for image comparison. [9] Figure 2.0.1--Large retina based sensors [12] Pros (Retina) Military grade reliability Very accurate/low false positives; error rate of 1 in 10,000,000 compared to 1 in 500 for some fingerprint biometrics. Almost 0% false negative rate Retina does not change throughout life (only exception is certain diseases) Nearly impossible to fake. Even if a person were to lose their eye, since the vessels in the eye deteriorate rapidly, it can’t be used for authentication. Speedy results[9][13][18] 40 | P a g e Cons (Retina) Very expensive Scanners are often large Subject being scanned must be close to the camera optics. Requires training and patience to use and thus not user friendly Measurement accuracy can be affected by a disease such as cataracts Measurement accuracy can be effected by contact lenses or glasses Measurement accuracy can be affected by severe astigmatism. May not accommodate all people properly, e.g. people in wheel chair may be too low on the ground to use the sensor which most are large, can’t be moved and requires user to look into it directly. Some will find it intrusive or may be even fearful because of the fact a laser is being used to scan the eye. [9][13][18] Ranking Based on Criteria Category Score Reason Number of security holes 10 Cost 2 No known exploitable security holes at this time. Hardware is too expensive Ease of Use 4 Increase in Security 10 Scalability 5 41 | P a g e Users must train to be able to use device. One of the most secure forms of authentication methods used today. Not scalable for smaller workstations with little physical space. The scanner is Practicality of 4 implementation and modding (How much change to existing infrastructure is needed) Access and Availability 5 often big and some would have difficulty accommodating for it. Lots of accommodations must be made to make room for the scanners. Not readily available on the market. Overall Score = 40 Typing Rhythm Introduction As it is well known that while the problems involved in maintaining balance between usability and security for text-based password authentication is well documented, some suggested that by layering biometrics on top of existing passwords, a higher level of security can be achieved. Typing rhythm biometric is an emerging biometric technology that others improved security by offering a form of 2-factor authentication by having users not only have to know their username and password, but must also know the distinctive typing patterns of a legitimist user in order to be granted access of a resource. The measurements used to provide the ``what you know`` component of authentication include; diagraph legacy—the delay between release of one key and the pressing of pressing of another and the hold time—the time between the press of one key and the release and another, all in which are measured in milliseconds. In the next section, we will explore the benefits and shortcomings of this technology and see how it may fair in a workstation environment. [9][13] 42 | P a g e How Does it Work The underlining foundation to how this technology works is simple in terms of concept, but complex in terms of implementation. Basically, everything is performed through software that not only stores username and password information, but also streams of diagraph legacy and hold times associated with at minimum the corresponding username and password. During enrolment, users make up a password. Then usually one, two or both of the following things happen depending on the software used; 1) After user comes up with a password, they are then told to repetitively retype the password so that it can learn the timing associated with the specific word. 2) The system evaluates user typing patterns during regular PC usage and profile’s the users based on what it learns during the session. Obviously as more information is gathered, the more accurate the more resistant it becomes in terms of false rejection rate. [18][19] The above phases can also be broken up into the; Enrolment phase – keystrokes are collected to form a profile. Classification—user provides typing samples used to comparison. Pros (Typing Rhythm) Very little change to existing infrastructure and no need for special hardware. No training required Offers 2-factor authentication (thus knowing user password is not enough to log in) Difficult to share timing information with others via writing it down 43 | P a g e Forces system admin to make use of policies for password length of at least 8 characters since typing rhythm cannot or is difficult to extract from short passwords. Costs the least among other forms of biometrics[18][19] Cons (Typing Rhythm) Attacks may potentially be able to use a recorder to pick up the sound made between key strokes and then from their attempt to get the password through traditional means. False rejection rate may be high in the beginning causing some user frustration when they are denied access. The technology at large is not yet widely available yet. Thus limited to only a small pool of vendors that offer the technology. The only large commercial product suite is BioPassword and it is limited to Windows systems[18][19] Ranking Based on Criteria Category Score Reason Number of security holes 7 Attacks may potentially be able to use a recorder to pick up the sound made between key strokes and then from their attempt to get the password through traditional means. Cost 10 Ease of Use 9 No expensive hardware needed. The only form of biometrics that does not require training 44 | P a g e Increase in Security 7 Scalability 5 Practicality of 10 implementation and modding (How much change to existing infrastructure is needed) Access and Availability 3 to use. Increased level of security over password based authentication. Limited support for other OS’s other then Windows at the moment. No additional hardware required. All performed through software which is easy to configure. Standard keyboard serves as the capture device. Very much a developing and prototype technology with limited suites. Overall Score = 51 < 53 Future Outlook and Conclusion For Biometrics Without a doubt, biometrics is definitely a good approach to improving security within the industry, but at the moment, most of the technologies review above either added too much expensive extra hardware to make it a widespread replacement for passwords or, are too inaccurate and provide too many false rejection rates to be productive in the work environment. The only exception that passed the comprehensive scoring system within this paper was Finger Print biometrics, and while it still does have the disadvantage of requiring specialized scanners, it is very secure, unique, and accurate enough to replace password in the near future providing they continue to be integrated into newer laptops and keyboards that a developed. In terms of what variation would be best for a company to invest in (optical, capacitance, ultra sonic) , I believe it would up to the company in which their security needs will come into play. 45 | P a g e Chapter 3: Token Based Authentication Introduction Token based authentication is a growing authentication solution that draws exclusively on the “something you have” component in authentication security although it is common in most token based systems to use one other additional component either the “something you know” or “something you are” component in a multi-layer authentication combination. The token itself is usually in the form in a small physical key (although not always the case since electronic tokens exist and will be touched on later), but it is usually some identifier that has been issued by the system administrator for the purpose of authentication. (Two-factor authentication). In a sense, the token rather hardware or software is in fact very much similar to a ‘key’. Keys are used in the real world to open doors. If you do not have a key or if you don’t have the one that corresponds to the lock, you will not be granted access to the secured content inside. The token is similar in the fact that it is used as a means to gain access to protected data, and without it, access to this content is denied. The next few paragraphs will be focused on the some of the various forms this technology can take shape, how they work, and the practicality of implantation over other authenticating technologies, and while each vendor implementation of this technology implements token based authentication differently, this paper would be discussing some of its more common iterations. [23] How does the Technology Work? 46 | P a g e Similar in a sense to biometrics in terms of options in that token based authentication can take many forms. The technology does not necessary have one methodology on how it functions, but instead can be broken down and implemented in a vast array of configurations. However, they do seem to share some common traits. First of all, they all make use of a token in which is used as a means to prove who a user is. These tokens also all generally fit into one of 3 categories. Paper based tokens—A challenge response that can either take the form of a ‘one time password’ or a ‘grid of codes’ the user enters in response to a challenge. Soft tokens—This kind of token system use digital tokens found on the client machine usually in the form of a cookie or some other specialized token application. Hard token—A physical token the user possesses that is used for authentication. It often takes the form of a specialized USB key with an encrypted digital signature on it or a smartcard. Hardware tokens are what most people usually think of when they think of token based security as a whole, is most likely the most secure of the 3 attributed to the two factor authentication that comes with having something that is physical, and as such will be the focus of this section. Hardware Token Breakdown Hardware tokens can be further broken down into three more sub categories which is based on how they connect to clients. They include; Disconnected Tokens 47 | P a g e Token’s that don’t make any physical contact with its clients. Authentication is usually randomly generated and entered manually. E.g. System A’s token generates a randomly generated single sign-on one time password on its LCD display and the user punches it in the system during the authentication process. [23] Figure 3.0.0—Using one-time login generated from token to log into system [27] Pros (Disconnected Tokens) Higher levels of security achieved through multi-level authentication Save money on sophisticated token scanning devices No wear and tear cause by swiping token against a reader, thus lowers costs of replacing damaged tokens. 48 | P a g e Randomly generated one time passwords eliminate the risks and problems permitted when users are given the power to come up with their own passwords. Multi-factor authentication reduces the risk of compromises occurring due to lost or stolen tokens. Immune to reply attacks that plague Connectionless tokens RSA encryption is added to reduce tampering No sophisticated readers or scanner required Many vendors to choose from [23] Cons (Disconnected Tokens) Users may lose their token and thus they will be denied access to service until token is reissued. You need dedicated department to manage tokens at all stages of the token life cycle. (e.g. tokens can be lost/broken, new users need new tokens, people leave the organization) If the algorithm that generates the one-time password is compromised for a particular vendor, hackers may be able to predict the next occurring one time password. These tokens have an LCD display and thus requires a small watch battery. As such, users need to replace the internal battery as needed or they may find themselves denied to a service should the battery die. The life of the average life battery is 3 years. [23][9] Ranking Based on Criteria Category 49 | P a g e Score Reason Number of security holes 9.5 There is a chance that an attacker could somehow get a hand on both the physical token as well as the second authentication requirement if through means of forcefully attacking and stealing the token from the user and then demanding them to provide them with the other requirement needed for access. (e.g. password) Even though the token itself is encrypted, if the attack does somehow figures out the algorithm behind the number generated by the one-time password. Security of the system would be cut in half and all new tokens would need to be purchased. (most tokens can’t be upgraded or programmed via firmware update) Cost 50 | P a g e 6.0 A study by InfoSec illustrates how lazy some end users are and because of the inconvenience brought in by another layer of authentication, some have defaulted to insecure practices like ‘leaving tokens on their desk’ or in drawers next to the workstation they normally use. Again this cuts security in half, but again complete access for an attacker is still not possible. Can be costly, if organization does not have experts on site knowledgeable on how to Ease of Use 9.5 Increase in Security 9.5 Scalability 10 51 | P a g e install the system. Also, tokens themselves have a short life-cycle, and replacements for damaged or lost tokens must be taken into consideration. Estimated life is based on battery life, that is 3-5 years. The cost of the actual token is estimated to be $12.00’s [32] per token but some may be a lot more. Also, some tokens have expiry dates so it’s important to looking at this when purchasing. [31] Straight forward. All that is required is the user gives the system the required 3 pieces of information needed to log in. That includes the username (if applicable) the one-time password (displayed on the LCD screen on the token) and the second form of authentication required which varies depending on module. Some however found Disconnected tokens and added inconvenience. Few major security risks. Even if the token is stolen, by the attacker, the multi-layer authentication requirements needed to gain access to the system will prevent compromise. The second authentication that kicks in could be anything from a user password to biometrics depending on the vendor. Disconnected tokens can be deployed in businesses of all size, however, the complexity involved in setting up some Practicality of implementation and modding (How much change to existing infrastructure is needed) 6.5 Access and Availability 7.0 systems may discourage small business owners with no IT staff. Studies show that many IT professionals found hardware tokens “cumbersome to install and maintain, with token deployment proving particularly time-consuming.” [31] Many website vendors offer disconnected tokens online but sometimes you may be forced to buy in large volumes. Overall Score = 58 Connected Tokens Tokens that make physical contact with the system during the authentication process. Smart cards and USB tokens fall into this category. [23] Figure 3.0.2—Smartcard [28] Figure 3.0.1—Example of USB token made by Goldkey 52 | P a g e Notice how the tokens above need to be inserted and left in the system during authentication. Pros (Connected Tokens) Higher levels of security achieved through multi-level authentication Multi-factor authentication reduces the risk of compromises occurring due to lost or stolen tokens. Immune to reply attacks that plague Connectionless tokens RSA encryption is added to reduce tampering Many vendors to choose from The physical token may take many forms, such as a smart card which can easily fit in a persons’ wallet or a USB key. Some software based connected token variations, the software token is put on a USB key and the reader reads and looks for the token on the key. This allows any key to be used as the token and thus provided flexibility in that specialized tokens may not be required. Connected tokens are cheap to replace Long life compared to battery operated tokens found in the other 2 token variations [23][28][9] Cons (Connected Tokens) Connected tokens are subject to wear and tear simply from daily use and thus have a much shorter life-cycle then the two other token forms. 53 | P a g e Users may lose their token and thus they will be denied access to service until token is reissued. USB tokens may get replaced faster than smartcards however since it’s not really a specialized component. Very little computational power since these tokens don’t have an internal battery. The smart card version requires special card readers [23] Ranking Based on Criteria Category Score Reason Number of security holes 9.0 There is a chance that an attacker could somehow get a hand on both the physical token as well as the second authentication requirement if through means of forcefully attacking and stealing the token from the user and then demanding them to provide them with the other requirement needed for access. (e.g. password) Even though the token itself is encrypted, if the attack does somehow figures out the algorithm behind the number generated by the one-time password. Security of the system would be cut in half and all new tokens would need to be purchased. (most tokens can’t be upgraded or programmed via firmware update) A study by InfoSec illustrates how lazy some end users are 54 | P a g e and because of the inconvenience brought in by another layer of authentication, some have defaulted to insecure practices like ‘leaving tokens on their desk’ or in drawers next to the workstation they normally use. Again this cuts security in half, but again complete access for an attacker is still not possible. Cost 55 | P a g e 7.0 With smartcards that use the older magnetic strip, the is the possibility the scanner could be rigged and extract and clone the PKI on the card. Later, the attack may clone the card. USB tokens can really very in price depending on who you buy from. Also, many supplies only sell in bulk orders in which have minimum purchase values. USB . Most USB tokens fall within a $50.00-$100.00 range. Some such as the ones made by SecureID goes for $300.00 but its lasts 5yrs. For a cheaper USB solution, there are some solutions that allow you to transfer digital certificates to ordinary USB keys. Smartcards are really cheap at around $0.10 per card but will require a specialized scanner, costing anywhere from $19-73 dollars. In addition, one needs to keep in mind that the everyday use of swiping the card against the reader Ease of Use 10 Increase in Security 8.5 Scalability 10.0 Practicality of implementation and modding (How much change to existing infrastructure is needed) 6 Access and Availability Overall Score = 56.5 56 | P a g e 6.0 will eventually wear it out and it will eventually need to be replaced. The exposed scanner may also be exposed to abuse by end-users. Anyone who has ever used a debit/credit card should be able to use this technology. Risks are low but still possible especially with smartcards in which are cheap enough to clone. Connected tokens can be deployed in businesses of all size, however, the complexity involved in setting up some systems may discourage small business owners with no IT staff. [31] Studies show that many IT professionals found hardware tokens “cumbersome to install and maintain, with token deployment proving particularly time-consuming.” [31] Smartcards require further changes to hardware infrastructure since it require a specialized card reader. Availability of connected tokens seem to only be offered at companies the specialize in them. These systems are not something you will find easily in retail. Also, many especially smartcards are only sold in large volumes or as packages. Contactless Tokens Similar to connected tokens except that connection between the token and the system is done wirelessly instead. E.g. some RFID solutions by ‘swiping’ card over a scanner. Figure 3.0.3—Contactless card and wireless dongo [29] Pros (Contactless Tokens) Higher levels of security achieved through multi-level authentication Multi-factor authentication reduces the risk of compromises occurring due to lost or stolen tokens. No wear and tear due to physical contact with the reader [30] Convenience and speed offered without either having to manually enter a displayed one-time password or inserting card into the reader. (can be read from a distance by the scanner) [30] Multiple tags can be read at once (10 – 100) [30] Cons (Contactless Token) Susceptible to rely attacks (there are capture devices readily available that captures the encrypted token as it is transmitted from the physical tag to the reader) Attackers can then reply the signal they captured and gain unauthorized access to protected 57 | P a g e resources. The capture devices for RFID tokens only go for a few hundred dollars while Bluetooth versions can be done through installable software. [30] Easily cracked [34][35] Users may lose their token and thus they will be denied access to service until token is reissued. Shorter battery life then connected tokens [35] Ranking Based on Criteria Category Score Reason Number of security holes 6 Cost 3 Ease of Use 10 Increase in Security 3 Has security issues the other token types don’t have, the most threatening being relay attacks. Very costly, could be anything from a few hundred to a few thousands and that does not include installation. The high price of this system and the reduced security is attributed to its ease of use. With this system, all you much do is wave the card in front of the scanner and it will read it. Huge security risks because of readily available tools that can be used to compromise systems. Bluetooth contactless tokens are susceptible to the many script kiddy tools available on line to download. The encryption is used in the Bluetooth token is only 48 bits. RFID is really bad at defending itself against 58 | P a g e relay attacks and for a few hundred dollar, attacks can purchase scanners that copy RFID authentication sessions as you make successful logins from a distance and then use them later. Contactless tokens can be deployed in businesses of all size, however, the complexity involved in setting up some systems may discourage small business owners with no IT staff. Scalability 10 Practicality of implementation and modding (How much change to existing infrastructure is needed) Access and Availability 6 Contactless tokens all require both the token itself and a specialized scanner to operate. 6 RFID contactless tokens are not mainstream while Bluetooth based ones are. The grade here reflects the average of both. Overall Score = 44 Typical Life Cycle of a Token Figure 3.0.4—process diagram of token life cycle [23] 1. User Registration—admin creates an account for the user 2. Token Production—A token is created 59 | P a g e 3. Token Distribution—Token is issued 4. Normal usage—user makes use of token through regular authentication sessions 5. Replacement—users may damage or misplace tokens in which they must be re-issued by system administrator. 6. Revocation—recalling and suspending tokens that already exist. (e.g. an employee who leaves the company no longer needs access) Various Vendors and Types of Token Based Solutions GoldKey USB tokens (connected) NagraID Security (connected smart card) VeriSign one-time-passwords (contactless) SecureID (disconnected) Speedpass (contactless) (uses RFID technology) Remote keyless entry systems (contactless) Bluetooth tokens (contactless) Simage Contactless Tokens (contactless) Future Outlook and Conclusion For Token Based Security Definitely one of the better forms of security in terms of practicality. Token based security seems to have a bright future, and while contactless tokens did not performed well my examination the other two did suggesting that this technology is defiantly something to look into. There is also a lot of vendor to choice from, which may make selection a bit nerve racking, but in general, based on scores alone, I feel connected tokens that make use of SmartCards are 60 | P a g e the best solution because of their much more reasonably priced reader, its two factor security, and the replacement cards are cheap. The USB tokens also seemed to be a good choice because they did not require specialized readers but because of the fact that the individual tokens were a bit pricy, it seems impractical in a way and may prove expensive since token keeping requires someone to manage token life cycle. Interpreting the Results After evaluating many authentication technologies, it was very surprising to find that none of the systems hit even close to a perfect score of 70/70 points. As you may have recalled from the beginning of this report, the goal was to find systems that meet the minimal passing threshold of 53/70 points in the evaluation system (which would equate to a score of about 75% if you do the math). The 75% mark to me seemed to be a high enough performance level indicator in which a change in authentication might be justified for an organization. Of the systems studied and put through the rigorous tests, only a few met the requirements, and those that did only marginally passed. The scores for the passing systems were as followed; Graphical passwords (Passfaces) = 55pts Biometrics (Finger Print Recognition) = 53.5pts Disconnected Tokens = 58pts Connected Tokens = 56.5pts These borderline results paint a picture why wide scale adaptation of higher level authentication has not taken off as quickly as it should of despite the fact nearly all systems offer improved security over passwords. It is also interesting to note that all the systems above 61 | P a g e were the only ones I found actually being use in industry, and while more exotic forms of authentications systems did exist and addressed various security issues, these systems in the end did not pass the tests and in turn, were not really used often in actual practice. Conclusion In the end, even though nearly every other form of authentication system offers increased security over password based authentication, once other variables are thrown into the equation, you get a better representation on what is actually going on in the market. As such, this marginal improvement may not be enough to stimulated change on a large scale as of yet and thus we may not be at the point where we can ditch passwords altogether. Glossary One-time-password—a randomly generated password that is assigned and used for access for a single session. Single-sign-on—the practice of using a one-time password for logging in Graphical password—authentication system that replaces traditional symbols with graphics. Biometrics—an authentication system that makes use of the “what you are” in order to function. Authentication is usually by means of utilizing a unique trait and comparing it to a match on the systems database. Token—an authentication system that utilizes the “what you have” part of security. The token is an object that is used for the authentication process. Many tokens are a physical representation of an object, however, soft tokens also exist. Contactless Token—works like connected token excepted the connection between the reader and token is done wirelessly. Disconnected Token—token generates a one-time-password that is then typed into the system. Connected Token—token that need to making physical contact with the reader to connect to a system. 62 | P a g e Paper Tokens—A challenge response that can either take the form of a ‘one time password’ or a ‘grid of codes’ the user enters in response to a challenge. Soft tokens—This kind of token system use digital tokens found on the client machine usually in the form of a cookie or some other specialized token application. Hard token—A physical token the user possesses that is used for authentication. It often takes the form of a specialized USB key with an encrypted digital signature on it or a smartcard. Bluetooth—a 2.45Ghz band wireless standard that is used for the transfer of data over short distances. It is commonly used for connecting peripherals like mice to pc’s. Bluetooth devices can be networked together to form piconet. Piconet—a small Bluetooth network. Radio-frequency identification (RFID)—A wireless technology that uses radio waves for information exchange between an electronic tag (or token) and the RFID sensor. They are commonly found in remote garage door opening systems as well as barcode scanners. They seem to have a history for being not very secure and as such is constantly under critical review. 2-factor authentication—an authentication system with two layers of different kinds of authentication. They are normally composed of two of the three kinds of systems; what you know, what you are, have you have. Multi-factor authentication—an authentication system with many layers of different kinds of authentication, not limited to just two. Algorithm—a mathematical formula often used to generated pseudo-random numbers in cryptography or can be used for the cryptographic key. Digital Signature—similar to a hand written signature, but applies to digital information. They are often used for data integrity purposes. Digital Certificate—an electronic document that uses a digital signature to associate public key with identity. Integrity—verifying data is accurate, unaltered and from who is says its being sent from. Confidentiality—protecting information from those who do not have privileges to access such information. Authentication—process of verifying who you are so you can access a secure resource. Encryption—a method of obscuring data so it cannot be read by those who do not have the decryption key. 63 | P a g e Decryption—process of making unreadable encrypted data readable. Smart Card—a pocket sized card that is often used as a security token. They can come in connected and disconnected form. Examples can be found in debit/credit cards used by banks. false rejection rate (FRR) –a measure used in biometrics to determine that rate in which valid authentication fails. False acceptance Rate (FAR) –the opposite of FRR and more dangerous, it is the rate in which a system give unauthorized persons entry to the system. RSA – a strong public key encryption standard that relies on its on-way function and the fact assurance that an extremely high prime number can not be factored easily. Keyloggers—malware that logs user keystrokes. Its normally deployed without the users knowledge in order for attackers to harvest sensitive information like credit card numbers and passwords. Brute-force attack—A kind of password based attack where the entire alpha-numeric combination is exhausted in order to get the password. The longer the password, the longer the attack takes to cycle through ever possible password combination. This attack is usually automated. Dictionary attack—A kind of password attack that uses commonly used passwords and other dictionary words in an attempt to crack a password. It typically is a faster alternative to the dictionary attack. It is also automated. photosite—light sensitive diode that is responsible for recording a single pixel of light. Optical Scanner—A type of finger print scanning method that uses shades of bright and dark light to scan the ridges and valley’s of a fingerprint. Capacitance Scanner—A type of finger print scanning method that uses electricity to scan the depth of each valley using the concept of open and closed circuit between the peaks and contact. Ultrasonic Scanner—A type of finger print scanning method that makes use of sound to scan a fingerprint much like how bats use echo-location to navigate around objects in front of them at night. diagraph legacy—the delay between release of one key and the pressing of pressing of another measured in milliseconds. 64 | P a g e hold time—the time between the press of one key and the release and another measured in milliseconds. Work Cited 1. Heckle, Rosa, Wayne Lutters, and David Gurzick. "Network authentication using single sign-on." Network authentication using single sign-on 1 (2008): 10. http://portal.acm.org (accessed February 10, 2010). 2. Adams, Anne, and Martina Angela Sasse. "User’s are not the enemy." Users are not the enemy 42, no. 12 (1999): 40-46. http://portal.acm.org (accessed February 18, 2010). 3. Weinshall, Daphna, and Scott Kirkpatrick. "Passwords you'll never forget, but can't recall." Passwords you'll never forget, but can't recall 1 (2004): 1399-1402. http://portal.acm.org (accessed February 18, 2010). 4. Moncur, Wendy, and Grégory Leplâtre. "Pictures at the ATM: exploring the usability of multiple graphical passwords." Pictures at the ATM: exploring the usability of multiple graphical passwords 1, no. 1 (2007): 887-894. http://portal.acm.org (accessed February 18, 2010). 5. Tari, Furkan, A. Ant Ozok, and Stephen H. Holden. "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords." A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords 1 (2006): 56-66. http://portal.acm.org (accessed February 8, 2010). 6. Saita, Anne. "Graphical passwords still far from picture perfect." Graphical passwords still far from picture perfect 1, no. 1 (2004): 1-2. http://google.com (accessed March 3, 2010). 7. Chapman , D. Brent , and Elizabeth D. Zwicky. "Building Internet Firewalls." Building Internet Firewalls 1 (1999). http://google.com (accessed March 3, 2010). Heckle, Rosa, Wayne Lutters, and David Gurzick. "Network authentication using single sign-on: the challenge of aligning mental models." Network authentication using single sign-on: the challenge of aligning mental models 1 (2008): 1-10. http://portal.acm.org (accessed February 18, 2010). 8. Ratha, N.K, J.H. Connell, and R.M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems." Enhancing security and privacy in biometricsbased authentication systems 40, no. 3 (2001): 1-21. http://google.com (accessed April 8, 2010). 9. Cranor, Lorrie Faith. Security and usability . Beijing [u.a.: O'Reilly, 2005. 10. " Two Factor Authentication, Graphical Passwords - Passfaces." Two Factor Authentication, Graphical Passwords - Passfaces. http://www.realuser.com/ (accessed December 18, 2010). 11. “Biometric Technology | eHow.com,” n.d. http://www.ehow.com/about_5452533_biometric-technology.html. 12. " Review: Biometrics Technologies Measure Up (Part 2/3)." PhysOrg.com - Science News, Technology, Physics, Nanotechnology, Space Science, Earth Science, Medicine. http://www.physorg.com/news8334.html. 65 | P a g e 13. “Biometrics.gov - Introduction to Biometrics,” n.d. http://www.biometrics.gov/Documents/Glossary.pdf 14. " Information Security: Covering today's security topics ." Information Security: Covering today's security topics . http://searchsecurity.techtarget.com/ (accessed December 19, 2010). 15. Jermyn, Ian, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. “The design and analysis of graphical passwords.” In Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, 1-1. Washington, D.C.: USENIX Association, 1999. http://portal.acm.org/citation.cfm?id=1251421.1251422. 16. “Sonia Chiasson - Carleton University » Research Interests,” n.d. http://hotsoft.carleton.ca/~sonia/wordpress/research-interests/. 17. “HowStuffWorks "How Fingerprint Scanners Work",” n.d. http://computer.howstuffworks.com/fingerprint-scanner3.htm. 18. “Advantages and disadvantages of technologies,” n.d. http://biometrics.pbworks.com/w/page/14811349/Advantages-and-disadvantages-oftechnologies?mode=print. 19. Ratha, N.K, J.H. Connell, and R.M. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. http://74.125.155.132/scholar?q=cache:rPoYTVV2R0kJ:scholar.google.com/&hl=en&as _sdt=2000. 20. Fernando, Chris. n.d. Password Protection: How to Create Strong Passwords | PC Magazine Middle and Near East. PC Magazine Article. Password Protection: How to Create Strong Passwords. http://www.pcmag-mideast.com/2010/08/31/passwordprotection-how-to-create-strong-passwords/. 21. Ives, Blake, Kenneth R. Walsh, and Helmut Schneider. 2004. The domino effect of password reuse. Commun. ACM 47, no. 4: 75-78. doi:10.1145/975817.975820. 22. Tracy V. Wilson. n.d. HowStuffWorks "How Biometrics Works". Science. How Biometrics Works. http://science.howstuffworks.com/biometrics.htm. 23. Borde, Duncan de. "Two-factor authentication." Siemens Insight Consulting. http://www.insight.co.uk/files/whitepapers/Twofactor%20authentication%20%28White%20paper%29.pdf (accessed Feb 2, 2011) 24. Technology News. "The Cost of Implementing Multi-Factor Authentication." The Cost of Implementing Multi-Factor Authentication. www.mirror99.com/20060202/the_cost_of_implementing_multi_factor_cdei.jspx (accessed February 14, 2011). 25. Anon. 2005. Two Factor Authentication, Graphical Passwords - Passfaces. http://www.realuser.com/. 26. Chiasson, Sonia. "USABLE AUTHENTICATION AND CLICK-BASED GRAPHICAL PASSWORDS." Chiasson PHD Theisis. hotsoft.carleton.ca/~sonia/content/Chiasson_PhDThesis2008_UsableAuthentication.pdf (accessed December 19, 2010). 27. Anon. n.d. Getting Computers to Understand Overlapping Speech - Innovation Toronto. Simple Arithmetic for Faster, More Secure Websites. http://www.innovationtoronto.com/2011/04/simple-arithmetic-for-faster-more-securewebsites/. 28. Anon. n.d. ExcelSystems. http://www.excelsystems-eg.com/sc.asp. 66 | P a g e 29. Anon. n.d. Tx Systems, Inc. - Contactless Readers. https://www.txsystems.com/sct.pages.php?p=contactless. 30. Aarti, R. 2000. Pros and Cons of RFID Technology. Pros and Cons of RFID Technology. http://www.buzzle.com/articles/pros-and-cons-of-rfid-technology.html. 31. , InfoSec. 2010. GrIDsure - Infosec Survey Illustrates Mistrust of Hard Token Based Authentication. News. News and Press. May 20. http://www.gridsure.com/news/detail.asp?ItemID=164. 32. Anon. n.d. RSA Lifeboat: It’s time to jump ship! | Mi-Token. Company Website. http://mi-token.com/rsa-lifeboat/. 33. Anderson, Ross J. 1994. Why cryptosystems fail. Commun. ACM 37, no. 11: 32-40. doi:10.1145/188280.188291. 34. Biba, Erin. n.d. Does Your Car Key Pose a Security Risk? - PCWorld. PCWorld. http://www.pcworld.com/article/119661/does_your_car_key_pose_a_security_risk.html. 35. Admin. 2011. What are contactless tokens? | uCertify Articles. UCertify Articles. April 8. http://www.ucertify.com/article/what-are-contactless-tokens.html. 36. 67 | P a g e