1. Trang chủ
  2. » Công Nghệ Thông Tin

lesson 7: Authentication docx

38 1K 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 38
Dung lượng 1,77 MB

Nội dung

LESSON 7 Authentication User management ♦ Authentication - Xác nhận người sử dụng ♦ Authorization - Kiểm soát quyền của người sử dụng ♦ Accounting - Theo dõi thống kê hành động What is authentication? ♦ Identification – Dấu hiệu, công cụ nhận dạng, nhận biết. ♦ Quá trình kiểm tra dấu hiệu nhận biết gọi là xác thực - Authentication. ♦ 3 Categories: – What you know – What you have – Who you are What you know ♦ Password ♦ Passphrase ♦ PIN ♦ Challenge/Response PASSWORD ♦ Ưu điểm - Đơn giản - Dễ sử dụng và quản lý ♦ Nhược điểm - Phải nhớ - Không an toàn Độ an toàn của Password ♦ Alphabet ♦ Recommend - Độ dài không nhỏ hơn 8 - Tổ hợp chữ hoa, chữ thường, số, các ký tự đặc biệt ♦ Các phương pháp tấn công - Từ điển - Lựa chọn - Vét cạn What you have ♦ One time password ♦ Keys Exchange ♦ Digital authentication – physical devices to aid authentication ♦ Common examples: – eToken – smart cards – RFID One Time Password ♦ Pseudo-random Generator ♦ Session time ♦ Synchronization eToken ♦ Can be implemented on a USB key fob or a smart card ♦ Data physically protected on the device itself ♦ On the client side, the token is accessed via password ♦ Successful client-side authentication with the password invokes the token to generate a stored or generated passcode, which is sent to the server- side for authentication. eToken ♦ May store credentials such as passwords, digital signatures and certificates, and private keys ♦ Can offer on-board authentication and digital signing [...]... and what you have • Can be stolen or forgotten • Susceptible to replay attacks – Who you are • Unique biometrics that hinder replay attacks and imposters • Privacy issues arise Authentication Token Formats ♦ A security token (authentication token) is a representation of security-related data (not to be confused with an eToken) ♦ Examples: – X.509 certificates – Kerberos tickets – Custom security tokens... orientation ♦ Position – X,Y location relative to some fixed points Algorithms ♦ Image-based ♦ Pattern-based ♦ Minutia-based Fingerprint Scanners Digital Persona U.are.U Pro HP IPAQ IBM Thinkpad T42 Biometric Authentication Terms ♦ False Acceptance Rate (FAR) – False Match Rate (FMR) – Percentage of access attempts by unauthorized individuals which are nevertheless successful ♦ False Rejection Rate (FRR) –... support ♦ May communicate with a variety of transponders (ISO15693, ISO14443 Type A & B, TagIt, Icode, etc.) ♦ Reader is controlled via PCMCIA interface using an ASCII protocol Who you are ♦ Biometric authentication – Use of a biometric reading to confirm that a person is who he/she claims to be ♦ Biometric reading – A recording of some physical or behavioral attribute of a person Physical Biometrics... that the certificate is valid) ♦ The recipient may confirm the identity of the sender with the Certificate Authority Kerberos Tickets ♦ Clients share secret symmetric key with server ♦ Clients login to authentication server ♦ Server returns a Ticket-Granting Ticket (TGT) encrypted with client’s key ♦ Client sends decrypted TGT to Ticket Granting Service ♦ TGS sends ticket authorizing network access and... Message Authorizing Application by User Secure Channel Custom Security Tokens ♦ May contain additional context information: – Access method • wired, local terminal • wired remote terminal • wireless PDA – Authentication method • Password • e-Token • Fingerprint – Trust level Trust Level Extension ♦ Different trust levels for devices with different levels of implementation reliability ♦ Still very abstract . LESSON 7 Authentication User management ♦ Authentication - Xác nhận người sử dụng ♦ Authorization - Kiểm soát quyền của người sử dụng ♦ Accounting - Theo dõi thống kê hành động What is authentication? ♦ Identification. chọn - Vét cạn What you have ♦ One time password ♦ Keys Exchange ♦ Digital authentication – physical devices to aid authentication ♦ Common examples: – eToken – smart cards – RFID One Time Password ♦ Pseudo-random. password ♦ Successful client-side authentication with the password invokes the token to generate a stored or generated passcode, which is sent to the server- side for authentication. eToken ♦ May

Ngày đăng: 29/07/2014, 08:20

TỪ KHÓA LIÊN QUAN

w