no slide title · 2017-02-28 · • with no constraints on choice of password –15 were a single...

56
صالتي احرازا پروتكلهاAuthentication protocols

Upload: others

Post on 07-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

پروتكلهاي احرازاصالت

Authentication protocols

Page 2: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

فهرست مطالب

قدمه م•

(كلمات عبور) احرازاصالت ضعيف•

(مبتني بر سؤال و جواب)احرازاصالت قوي •

پروتكل كربروس•

Page 3: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

مقدمه

Page 4: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

مقدمه

Page 5: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

• Something you know (a PIN, or password).

• Something you have:

– secureID card or other token, generating a one-time

password.

– a key imbedded in a ‘secure area’

– a smartcard (which may have keys imbedded and can

perform cryptographic operations on behalf of a user).

• Something you are (a biometric).

Basis for Authentication

Page 6: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

فهرست مطالب

قدمه م•

(كلمات عبور )احرازاصالت ضعيف•

(مبتني بر سؤال و جواب)احرازاصالت قوي •

پروتكل كربروس•

Page 7: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

احراز اصالت ضعيف

Page 8: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

احراز اصالت ضعيف

Page 9: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

احراز اصالت ضعيف

Page 10: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Password Vulnerabilities

• Writing them down

• Stolen passwords (via eavesdropping)

– Trojan Horse

• Poor password choice

– Easy to guess, easy to remember

– People use the same password multiple times

– Passwords changed infrequently

• Offline attacks

– Search through password dictionary

Page 11: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Survey of 3,289 Passwords

• With no constraints on choice of password

– 15 were a single ASCII letter.

– 72 were strings of two ASCII letters.

– 464 were strings of three ASCII letters.

– 47 were strings of four alphanumerics.

– 706 were five letters, all upper-case or all

lower-case.

– 605 were six letters, all lower case.

Page 12: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

حمالت عليه روشه هاي مبتني بر كلمه عبور و راه كار مقابله

Page 13: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

حمالت عليه روشه هاي مبتني بر كلمه عبور و راه كار مقابله

Page 14: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

بهبود امنيت در روش هاي مبتني بر كلمه عبور

Page 15: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

نمک زدن

Page 16: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

عبارتهاي كلمه عبور

Page 17: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

كلمه عبورهاي يک بار مصرف

Page 18: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

كلمه عبورهاي يک بار مصرف

Page 19: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

كلمه عبورهاي يک بار مصرف

Page 20: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

كلمه عبورهاي يک بار مصرف

Page 21: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

كلمه عبورهاي يک بار مصرف

Page 22: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

احراز اصالت دو عاملي

Page 23: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

فهرست مطالب

قدمه م•

(كلمات عبور) احرازاصالت ضعيف•

(مبتني بر سؤال و جواب)احرازاصالت قوي •

پروتكل كربروس•

Page 24: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

• In strong authentication, one entity ‘proves’ its identity to

another by demonstrating knowledge of a secret known to

be associated with that entity, without revealing that secret

itself during the protocol.

• Also called `challenge-response’ authentication.

• Use cryptographic mechanisms to protect messages in

protocol:

– Encryption.

– Integrity mechanism (e.g. MAC).

– Digital signature.

Strong Authentication

Page 25: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

1. A B: ‘Hi Bob, I’m Alice’

2. B A: R (challenge)

3. A B: {R || B}K (response)

(Here, {X}K means string X encrypted

under key K, and || means concatenation

of strings.)

Encryption-based Unilateral Authentication

Page 26: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

• Eve ‘sees’ R and {R || B}K. Because of idealised

encryption, she should learn nothing about K.

• Bob gets his challenge R back again, in an encrypted

form that only Alice can prepare. This allows him to be

sure of origin and integrity of the message.

• But Mallory can impersonate Bob easily: so Bob not

authenticated to Alice. Only unilateral authentication

(of Alice to Bob).

Security of the Protocol

Page 27: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

• Mallory can’t prepare the correct response

{R || B}K to Bob’s challenge because he

doesn’t know K.

• But R must be unpredictable: otherwise

Mallory can masquerade as Alice in a

subsequent protocol run, replaying Alice’s

response.

Replay Attack

Page 28: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

• The replay attack shows that origin and integrity checking

are not enough – we also need a means of checking

freshness of messages and liveness of principals.

• Freshness: assurance that message has not been used

previously and originated within an acceptably recent

timeframe.

• Liveness: assurance that message sent by a principal

within an acceptably recent timeframe.

• Three main methods for providing freshness:

– Nonce (Number used ONCE).

– Sequence numbers

– Time-stamps (clock-based or `logical’ time-stamps).

Replay Attack

Page 29: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Standard bilateral Authentication

• Alice and Bob share (strong) key k

• Simple challenge-response type protocol:

(Na,Nb - nonces)

Ek(Na)

Na, Ek(Nb)

Nb

Page 30: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Attack on Simple Protocol

• “Oracle Attack”

dummy=Ek(Na)

Na, Ek(Nb)

Nb

Ek(Nb)

Nb, Ek(Nc)

Page 31: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Protocol Fix?

• Modified challenge-response type protocol:

Na

Ek(Na), Ek(Nb)

Nb

اين پروتكل نيز آسيب پذير است

Page 32: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Attack on Modified Protocol

• “Parallel Session Attack”

Na

Na

Nb

Ek(Na), , Ek(Nb)

Nb

Ek(Na), , Ek(Nb)

Page 33: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Correct Protocol

Na

[B|A|Na|Nb]k

[A|Nb]k

Page 34: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Password-based Protocols

• Telnet - vulnerable to replay attacks

pwd Client Server

• Hashing does not help

h(pwd) Client Server

Page 35: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Password-based Protocols

Client Server cha

h(cha,pwd)

• Challenge-Response : vulnerable to offline

dictionary attacks

• Problem: “verifiable text”

Page 36: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Password-based Protocols

• SSH: Relies on public key

gx Client Server gy,SigS(gx,gy)

Verify Sig

K=gxy

EK(user,pwd)

• Similar protocols relying on public keys: – [SSL],[Halevi-Krawczyk],[Boyarsky],[Shoup]

Page 37: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Password Auth. - Attempt

• Intuition: authenticate Diffie-Hellman values

using PRF with password as key.

• Insecure! (eavesdropper obtains verifiable text)

W, a

V, b

W=gx

a=fp(W)

p p

Check a=fp(W)

V=gy

b=fp(V) Check b=fp(V)

Page 38: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

Kerberos

41

Page 39: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

کربروس

د متقارنيکل يت بر اساس رمز نگاريپروتکل احراز هو• MITشده در يطراح•ع شده، يت در هر کارگزار به صورت توزياحراز هو يبه جا•

م يدهيت اختصاص ميک کارگزار خاص را به احراز هوي آن در حال استفاده هستند 5و 4نسخه هاي • .برقرار ميشود( mutual)احراز هويت دو جانبه •

کارگزاران و کارفرمايان هردو از هويت طرف مقابل • اطمينان حاصل ميکنند

42

Page 40: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

کربروس عمومي ويژگيهاي

چند تعريف به نوعي معادل . يک محدوده دسترسي را مشخص مي کند: دامنه •

.دامنه هاي تعريف شده در ويندوز مي باشد

. معادل کارگزار کربروس مي باشد: مرکز توزيع کليد•

•Principal : به سرويس ها، دستگاه ها، کاربران و کليه عناصري که .احتياج به شناساندن خود به کارگزار کربروس دارند، گفته مي شود

در واقع نوعي گواهي است که هنگام ورود کاربر به قلمرو : بليط•

به او داده مي شود که بيانگر اعتبار او براي دسترسي به منابع کربروس .شبکه مي باشد

43

Page 41: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

شماي کلي :4کربروس نسخه

44

Page 42: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

1-بررسي الگوريتم :4کربروس نسخه

45

AS Client

2. EKClient[KClient,tgs|IDtgs|TS2|Lifetime2|Tickettgs]

1. IDClient|IDtgs|TS1

Tickettgs=EKtgs[KClient,tgs|IDClient|AddrClient|IDtgs|TS2|Lifetime2]

Page 43: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

”اعطاء خدمات“ بليطبدست آوردن

48

Tgs-Server Client

3. IDserver|Tickettgs|AuthenticatorClient

TicketServer=

EKserver[KClient,server|IDClient|AddrClient|IDserver|TS4|Lifetime4]

AuthenticatorClient=

EKClient,tgs[IDClient|AddrClient|TS3]

4. EKClient,tgs [KClient,server|IDserver|TS4|Ticketserver]

Page 44: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

بليط کارگزار

49

تمامي با كليد كارگزار رمز

شده اند

كليد جلسه بين كارفرما و كارگزار

شناسه آدرس كارفرما

كارفرما

شناسه TGS

مهر زماني و دوره اعتبار بليط

TicketServer= EKserver[KClient,server|IDClient|AddrClient|IDserver|TS4|Lifetime4]

Page 45: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

اعتبار نامه کارفرما

50

شناسه كارفرما

آدرس كارفرما

مهر زماني

AuthenticatorClient= EKClient,tgs[IDClient|AddrClient|TS3]

تمامي با كليد جلسه رمز

شده اند

Page 46: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

فرمانتايج اين مرحله براي کار

( Authenticator)اعتبار نامه يکجلوگيري از حمله تکرار با استفاده از • .يکبار مصرف که عمر کوتاهي دارد

بدست آوردن کليد جلسه براي ارتباط با سرور •

51

Page 47: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

خدمات سروردستيابي به

52

Client

Server

5. TicketServer|AuthenticatorClient

6. EKClient,Server [TS5+1]

Page 48: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

فرمانتايج اين مرحله براي کار

با برگرداندن پيغام کارگزار در گام ششم احراز هويت• رمزشده

تکرارجلوگيري از بروز حمله •

53

Page 49: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

شماي کلي :4کربروس نسخه

54

Page 50: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

کربروس قلمرو

:از بخشهاي زير تشکيل شده استکربروس قلمرو • کارگزار کربروس – کارفرمايان – Application Serversکاربردي کارگزاران–

.کارگزار کربروس گذرواژه تمام کاربران را در پايگاه داده خود دارد• .مي باشد حوزه مديريتيمعموالً هر قلمرو معادل يک •

55

Page 51: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

(InterRealm)هويت شناسي بين قلمرويي

موجود در قلمروهاي خدماتامکان اينکه کاربران بتوانند از • .ديگر استفاده کنند

با کارگزاران کربروسيک کليد مخفي هر قلمرو کارگزاران کربروس– . قلمرو همکار مقابل به اشتراک ميگذارند

.کليد مخفي است N(N-1)/2قلمرو همکار نيازمند Nوجود – . دو کارگزار کربروس همديگر را ثبت نام مينمايند–

56

Page 52: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

هويت شناسي بين قلمرويي

57

Page 53: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

5کربروس نسخه

مشخصات• مطرح شد 1990در اواسط – نقص ها و کمبودهاي نسخه قبلي را برطرف کرده است– .در نظر گرفته شده است RFC 1510به عنوان استاندارد اينترنتي –بعنوان روش 5استاندارد اينترنتي کربروس نسخه از 2000ويندوز –

.اصلي هويت شناسي کاربران استفاده مي کند

58

Page 54: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

5و نحوه رفع آنها در نسخه Kerberos v4مشکالت

(DES)وابستگي به يک سيستم رمزنگاري خاص• مي توان از هر الگوريتم متقارن استفاده کرد 5در نسخه +

IPوابستگي به • استفاده کرداي آدرس شبکه نوع مي توان از هر 5در نسخه + خاصبه يک سرور متفاوت در دسترسي اعتبار کاربراستفاده از امکان–سرويس از حساب کاربر متفاوت از کاربر اجازه داده مي شود که 5در نسخه +

login کرده انجام شود . تعداد کليدها بصورت تصاعدي افزايش مي يابد ،با افزايش تعداد قلمروها– .اين مشکل حل شده استبا استفاده از معماري سلسه مراتبي 5در نسخه +

59

Page 55: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

60

Hierarchy/Chain of Realms

Page 56: No Slide Title · 2017-02-28 · • With no constraints on choice of password –15 were a single ASCII letter. –72 were strings of two ASCII letters. –464 were strings of three

شماي کلي :5کربروس نسخه

61