DOC PREVIEW
USC CSCI 530 - authentication_sp07

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530 LabAuthenticationSlide 3How much authentication is needed?How can authentication be broken?Password BreakingSlide 7Rainbow TablesDetecting someone trying to break into a systemThis week’s labCSCI 530 LabAuthenticationAuthenticationAuthentication is verifying the identity of a particular personExample: Logging into a systemExample: PGP – Digital Signature is the authentication mechanismDifferent from AuthorizationAuthorization states what he/she can do on a systemAuthenticationHow do we authenticate:Something they knowPasswordSomething they areRetinaFingerprintDNASomething they ownSmart CardSomewhere they areLogin only works at certain terminalsHow much authentication is needed?We can use either one or a combination of all the aboveClient systemsNormally just a loginMilitary top secret security baseNameBadgePasscodeCredit card purchasesDriver’s licenseNamePictureHow can authentication be broken?For security purposes, we need to know how authentication can be broken so we know how to prevent against itPasswordsCan be GuessedCan be CrackedSmartcardsCan be copied or stolenFingerprintsCan be copied by using scotch tapePassword BreakingDictionary attackList of dictionary words that are tried one after anotherVery quickIf the password is not an exact match to a word on the list, then it will failHybrid attackUses a dictionary list but can detect slight variations to words, or combinations of words.Example: if the word hello is in the database, but the password is Hello, a dictionary attack will not break the password, but a Hybrid attack willGenerally finds many more words than a Dictionary attackNot as quick as Dictionary attackPassword BreakingBruteforce attackWill try every character combination until it finds the passwordEXTREMELY SLOWWill always find the passwordThese techniques can either be used against a system or a file containing the passwordsRainbow TablesPhilippe OechslinUses a reduce function to attempt to map a hash to a passwordUses chains to determine the exact passwordFor a good primer on Rainbow Tables, see:http://kestas.kuliukas.com/RainbowTables/ProsCan break any password in a matter of minutesConsMust have specific Rainbow Table for a particular hashing functionCan be defeated using SaltsDetecting someone trying to break into a systemAuto-logoutIf the user enters the wrong password n times, disable their account for a certain period of timeProtect your password list on your systemMake sure the administrator has access and no one else, so a normal user cannot copy it onto another systemThis week’s labUsing a Virtual Linux systemLogin as root, create user names, then copy the password file to the Windows host systemUse John the Ripper to break the passwords in the password fileMust be done in lab since we are using a Linux virtual


View Full Document

USC CSCI 530 - authentication_sp07

Download authentication_sp07
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view authentication_sp07 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view authentication_sp07 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?