SlideShare a Scribd company logo
Information and Network Security:47
Authentication Applications
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
User Authentication
fundamental security building block
basis of access control & user accountability
is the process of verifying an identity claimed by or for a system
entity
has two steps:
identification - specify identifier
verification - bind entity (person) and identifier
distinct from message authentication
User Authentication
• User authentication is the basis for most types of access control and for
user accountability.
• RFC 2828 defines user authentication as the process of verifying an identity
claimed by or for a system entity.
• An authentication process consists of two steps:
• Identification step: Presenting an identifier to the security system.
(Identifiers should be assigned carefully, because authenticated identities
are the basis for other security services, such as access control service.)
• Verification step: Presenting or generating authentication information that
corroborates the binding between the entity and the identifier.”
• In essence, identification is the means by which a user provides a claimed
identity to the system; user authentication is the means of establishing the
validity of the claim.
Means of User Authentication
four means of authenticating user's identity
based one something the individual
knows - e.g. password, PIN
possesses - e.g. key, token, smartcard
is (static biometrics) - e.g. fingerprint, retina
does (dynamic biometrics) - e.g. voice, sign
can use alone or combined
all can provide user authentication
all have issues
Means of User Authentication
• There are four general means of authenticating a user's identity, which can
be used alone or in combination:
• • Something the individual knows: Examples includes a password, a
personal identification number (PIN), or answers to a prearranged set of
questions.
• • Something the individual possesses: Examples include electronic
keycards, smart cards, and physical keys. This type of authenticator is
referred to as a token.
• • Something the individual is (static biometrics): Examples include
recognition by fingerprint, retina, and face.
• • Something the individual does (dynamic biometrics): Examples include
recognition by voice pattern, handwriting characteristics, and typing
rhythm.
Means of User Authentication
• All of these methods, properly implemented and used, can provide secure
user authentication.
• However, each method has problems.
• An adversary may be able to guess or steal a password. Similarly, an
adversary may be able to forge or steal a token.
• A user may forget a password or lose a token.
• Further, there is a significant administrative overhead for managing
password and token information on systems and securing such information
on systems.
• With respect to biometric authenticators, there are a variety of problems,
including dealing with false positives and false negatives, user acceptance,
cost, and convenience.
Authentication Protocols
• used to convince parties of each others identity and to exchange
session keys
• may be one-way or mutual
• key issues are
• confidentiality – to protect session keys
• timeliness – to prevent replay attacks
Replay Attacks
• where a valid signed message is copied and later resent
• simple replay
• repetition that can be logged
• repetition that cannot be detected
• backward replay without modification
• countermeasures include
• use of sequence numbers (generally impractical)
• timestamps (needs synchronized clocks)
• challenge/response (using unique nonce)
Replay Attacks
• Replay Attacks are where a valid signed message is copied and later resent.
Such replays, at worst, could allow an opponent to compromise a session
key or successfully impersonate another party.
• At minimum, a successful replay can disrupt operations by presenting
parties with messages that appear genuine but are not
• Possible countermeasures include the use of:
• • sequence numbers (generally impractical since must remember last
number used with every communicating party)
• • timestamps (needs synchronized clocks amongst all parties involved,
which can be problematic)
• • challenge/response (using unique, random, unpredictable nonce, but not
suitable for connectionless applications because of handshake overhead)
One-Way Authentication
• required when sender & receiver are not in communications at same
time (eg. email)
• have header in clear so can be delivered by email system
• may want contents of body protected & sender authenticated
One-Way Authentication
• One application for which encryption is growing in popularity is
electronic mail (e-mail).
• The very nature of electronic mail, and its chief benefit, is that it is
not necessary for the sender and receiver to be online at the same
time.
• Instead, the e-mail message is forwarded to the receiver’s electronic
mailbox, where it is buffered until the receiver is available to read it.
• The "envelope" or header of the e-mail message must be in the clear,
so that the message can be handled by the store-and-forward e-mail
protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
One-Way Authentication
• However, it is often desirable that the mail-handling protocol not
require access to the plaintext form of the message, because that
would require trusting the mail- handling mechanism.
• Accordingly, the e-mail message should be encrypted such that the
mail- handling system is not in possession of the decryption key.
• A second requirement is that of authentication.
• Typically, the recipient wants some assurance that the message is
from the alleged sender.
Using Symmetric Encryption
• as discussed previously can use a two-level hierarchy of keys
• usually with a trusted Key Distribution Center (KDC)
• each party shares own master key with KDC
• KDC generates session keys used for connections between parties
• master keys used to distribute these to them
Using Symmetric Encryption
• A two-level hierarchy of symmetric encryption keys can be used to
provide confidentiality for communication in a distributed
environment.
• Usually involves the use of a trusted key distribution center (KDC).
Each party in the network shares a secret master key with the KDC.
• The KDC is responsible for generating session keys, and for
distributing those keys to the parties involved, using the master keys
to protect these session keys.
Assignment
• What is user authentication? What are the means of user
authentication
• Explain Replay Attacks and One-Way Authentication.

More Related Content

PPTX
Information and network security 9 model for network security
PPTX
Information and network security 1 introduction
PPTX
Information and network security 3 security challenges
PPTX
Information and network security 5 security attacks mechanisms and services
PPTX
Information and network security 7 security services
PPTX
Information and network security 6 security attacks
PPTX
Information and network security 2 nist security definition
PPTX
Ns lecture5: Introduction to Computer, Information, and Network Security.
Information and network security 9 model for network security
Information and network security 1 introduction
Information and network security 3 security challenges
Information and network security 5 security attacks mechanisms and services
Information and network security 7 security services
Information and network security 6 security attacks
Information and network security 2 nist security definition
Ns lecture5: Introduction to Computer, Information, and Network Security.

What's hot (20)

PPTX
Information and network security 4 osi architecture
PDF
BAIT1103 Course Overview
PPTX
Smart city project's Information Security challenges
PDF
Introduction to Network security
PPTX
Chapter- I introduction
PPTX
Cryptographic Security
PPTX
PPTX
02 introduction to network security
PPT
PPT
Information Assurance And Security - Chapter 2 - Lesson 3
PPTX
Ethical Hacker
PPTX
Security in e commerce
PPT
Introduction to information security
PPT
PPT
Nw sec
PPTX
Cyber Security # Lec 3
PPTX
Introduction to Information Security
PPT
Types of attack -Part2
PPT
Information Security
PPT
Introduction to computer security syllabus
Information and network security 4 osi architecture
BAIT1103 Course Overview
Smart city project's Information Security challenges
Introduction to Network security
Chapter- I introduction
Cryptographic Security
02 introduction to network security
Information Assurance And Security - Chapter 2 - Lesson 3
Ethical Hacker
Security in e commerce
Introduction to information security
Nw sec
Cyber Security # Lec 3
Introduction to Information Security
Types of attack -Part2
Information Security
Introduction to computer security syllabus
Ad

Similar to Information and network security 47 authentication applications (20)

PPTX
PPT
User authentication crytography in cse engineering
PPT
PDF
Class paper final
PDF
IS Unit 7_Network Security
PPTX
user authentication in cryptography and network security.pptx
PPT
1 security goals
PPT
authentication u5.ppt
PDF
Two-factor authentication- A sample writing _Zaman
PPTX
Unit-4-User-Authentication.pptx
PPT
Eds user authenticationuser authentication methods
PPTX
How to write secure code
PPTX
Information Security and Privacy-Unit-2.pptx
PPTX
PPTX
cryptographydiksha.pptx
PDF
IS - User Authentication
PPTX
Authentication and session v4
PDF
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
PDF
5. Identity and Access Management
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
User authentication crytography in cse engineering
Class paper final
IS Unit 7_Network Security
user authentication in cryptography and network security.pptx
1 security goals
authentication u5.ppt
Two-factor authentication- A sample writing _Zaman
Unit-4-User-Authentication.pptx
Eds user authenticationuser authentication methods
How to write secure code
Information Security and Privacy-Unit-2.pptx
cryptographydiksha.pptx
IS - User Authentication
Authentication and session v4
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
5. Identity and Access Management
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues

Recently uploaded (20)

PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Digital Strategies for Manufacturing Companies
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
System and Network Administration Chapter 2
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
history of c programming in notes for students .pptx
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
L1 - Introduction to python Backend.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Digital Strategies for Manufacturing Companies
PTS Company Brochure 2025 (1).pdf.......
VVF-Customer-Presentation2025-Ver1.9.pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
System and Network Administration Chapter 2
How Creative Agencies Leverage Project Management Software.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Which alternative to Crystal Reports is best for small or large businesses.pdf
history of c programming in notes for students .pptx
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
CHAPTER 2 - PM Management and IT Context
Operating system designcfffgfgggggggvggggggggg
Wondershare Filmora 15 Crack With Activation Key [2025
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
ISO 45001 Occupational Health and Safety Management System
Upgrade and Innovation Strategies for SAP ERP Customers
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
L1 - Introduction to python Backend.pptx

Information and network security 47 authentication applications

  • 1. Information and Network Security:47 Authentication Applications Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. User Authentication fundamental security building block basis of access control & user accountability is the process of verifying an identity claimed by or for a system entity has two steps: identification - specify identifier verification - bind entity (person) and identifier distinct from message authentication
  • 3. User Authentication • User authentication is the basis for most types of access control and for user accountability. • RFC 2828 defines user authentication as the process of verifying an identity claimed by or for a system entity. • An authentication process consists of two steps: • Identification step: Presenting an identifier to the security system. (Identifiers should be assigned carefully, because authenticated identities are the basis for other security services, such as access control service.) • Verification step: Presenting or generating authentication information that corroborates the binding between the entity and the identifier.” • In essence, identification is the means by which a user provides a claimed identity to the system; user authentication is the means of establishing the validity of the claim.
  • 4. Means of User Authentication four means of authenticating user's identity based one something the individual knows - e.g. password, PIN possesses - e.g. key, token, smartcard is (static biometrics) - e.g. fingerprint, retina does (dynamic biometrics) - e.g. voice, sign can use alone or combined all can provide user authentication all have issues
  • 5. Means of User Authentication • There are four general means of authenticating a user's identity, which can be used alone or in combination: • • Something the individual knows: Examples includes a password, a personal identification number (PIN), or answers to a prearranged set of questions. • • Something the individual possesses: Examples include electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a token. • • Something the individual is (static biometrics): Examples include recognition by fingerprint, retina, and face. • • Something the individual does (dynamic biometrics): Examples include recognition by voice pattern, handwriting characteristics, and typing rhythm.
  • 6. Means of User Authentication • All of these methods, properly implemented and used, can provide secure user authentication. • However, each method has problems. • An adversary may be able to guess or steal a password. Similarly, an adversary may be able to forge or steal a token. • A user may forget a password or lose a token. • Further, there is a significant administrative overhead for managing password and token information on systems and securing such information on systems. • With respect to biometric authenticators, there are a variety of problems, including dealing with false positives and false negatives, user acceptance, cost, and convenience.
  • 7. Authentication Protocols • used to convince parties of each others identity and to exchange session keys • may be one-way or mutual • key issues are • confidentiality – to protect session keys • timeliness – to prevent replay attacks
  • 8. Replay Attacks • where a valid signed message is copied and later resent • simple replay • repetition that can be logged • repetition that cannot be detected • backward replay without modification • countermeasures include • use of sequence numbers (generally impractical) • timestamps (needs synchronized clocks) • challenge/response (using unique nonce)
  • 9. Replay Attacks • Replay Attacks are where a valid signed message is copied and later resent. Such replays, at worst, could allow an opponent to compromise a session key or successfully impersonate another party. • At minimum, a successful replay can disrupt operations by presenting parties with messages that appear genuine but are not • Possible countermeasures include the use of: • • sequence numbers (generally impractical since must remember last number used with every communicating party) • • timestamps (needs synchronized clocks amongst all parties involved, which can be problematic) • • challenge/response (using unique, random, unpredictable nonce, but not suitable for connectionless applications because of handshake overhead)
  • 10. One-Way Authentication • required when sender & receiver are not in communications at same time (eg. email) • have header in clear so can be delivered by email system • may want contents of body protected & sender authenticated
  • 11. One-Way Authentication • One application for which encryption is growing in popularity is electronic mail (e-mail). • The very nature of electronic mail, and its chief benefit, is that it is not necessary for the sender and receiver to be online at the same time. • Instead, the e-mail message is forwarded to the receiver’s electronic mailbox, where it is buffered until the receiver is available to read it. • The "envelope" or header of the e-mail message must be in the clear, so that the message can be handled by the store-and-forward e-mail protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
  • 12. One-Way Authentication • However, it is often desirable that the mail-handling protocol not require access to the plaintext form of the message, because that would require trusting the mail- handling mechanism. • Accordingly, the e-mail message should be encrypted such that the mail- handling system is not in possession of the decryption key. • A second requirement is that of authentication. • Typically, the recipient wants some assurance that the message is from the alleged sender.
  • 13. Using Symmetric Encryption • as discussed previously can use a two-level hierarchy of keys • usually with a trusted Key Distribution Center (KDC) • each party shares own master key with KDC • KDC generates session keys used for connections between parties • master keys used to distribute these to them
  • 14. Using Symmetric Encryption • A two-level hierarchy of symmetric encryption keys can be used to provide confidentiality for communication in a distributed environment. • Usually involves the use of a trusted key distribution center (KDC). Each party in the network shares a secret master key with the KDC. • The KDC is responsible for generating session keys, and for distributing those keys to the parties involved, using the master keys to protect these session keys.
  • 15. Assignment • What is user authentication? What are the means of user authentication • Explain Replay Attacks and One-Way Authentication.