Podcast
Questions and Answers
In a generic biometric system, what is the primary function of the feature extractor?
In a generic biometric system, what is the primary function of the feature extractor?
- To convert the raw biometric data into a usable template. (correct)
- To compare the extracted features against stored biometric templates.
- To capture the initial biometric data directly from the user.
- To manage the user interface for enrollment and authentication.
Which component is exclusively responsible for creating the initial association between a user and their biometric characteristics?
Which component is exclusively responsible for creating the initial association between a user and their biometric characteristics?
- The user interface.
- The biometric database.
- The enrollment process. (correct)
- The feature matcher.
What is the key difference between verification and identification in a biometric system?
What is the key difference between verification and identification in a biometric system?
- Verification confirms a claimed identity, while identification determines an unknown user's identity. (correct)
- Verification uses N templates, while identification uses only one.
- Verification requires a PIN, while identification does not.
- Verification identifies an unknown user, while identification confirms a claimed identity.
Consider a scenario where a user attempts to access a secure facility. The biometric system checks their fingerprint against a stored template associated with their claimed identity. Which process is the system performing?
Consider a scenario where a user attempts to access a secure facility. The biometric system checks their fingerprint against a stored template associated with their claimed identity. Which process is the system performing?
In a biometric system designed for identifying individuals in a large database without any prior claim of identity, which of the following factors would MOST critically impact the system's performance and accuracy?
In a biometric system designed for identifying individuals in a large database without any prior claim of identity, which of the following factors would MOST critically impact the system's performance and accuracy?
In the context of eID user authentication, what is the primary role of the 'PIN' entry?
In the context of eID user authentication, what is the primary role of the 'PIN' entry?
According to the content, what is the purpose of Password Authenticated Connection Establishment (PACE)?
According to the content, what is the purpose of Password Authenticated Connection Establishment (PACE)?
Which of the following is NOT mentioned as a physical characteristic used in biometric authentication?
Which of the following is NOT mentioned as a physical characteristic used in biometric authentication?
What is a key disadvantage of biometric authentication compared to passwords and tokens?
What is a key disadvantage of biometric authentication compared to passwords and tokens?
According to the figure depicting cost versus accuracy, which biometric characteristic generally offers a balance between cost-effectiveness and accuracy?
According to the figure depicting cost versus accuracy, which biometric characteristic generally offers a balance between cost-effectiveness and accuracy?
For online applications, how is access established using Password Authenticated Connection Establishment (PACE)?
For online applications, how is access established using Password Authenticated Connection Establishment (PACE)?
In the context of eID, what is the immediate next step after the 'Service request' by the user, as illustrated?
In the context of eID, what is the immediate next step after the 'Service request' by the user, as illustrated?
What is the Card Access Number (CAN) used for in offline applications, according to the content?
What is the Card Access Number (CAN) used for in offline applications, according to the content?
Imagine a scenario where an eID card's RF chip is successfully read without explicit access control. Which security principle has been MOST directly violated?
Imagine a scenario where an eID card's RF chip is successfully read without explicit access control. Which security principle has been MOST directly violated?
Suppose a new biometric authentication method boasts both extremely low cost and exceptionally high accuracy. What inherent technological challenge would MOST critically need to be addressed to ensure its viability?
Suppose a new biometric authentication method boasts both extremely low cost and exceptionally high accuracy. What inherent technological challenge would MOST critically need to be addressed to ensure its viability?
According to RFC 4949, what is the primary function of user authentication?
According to RFC 4949, what is the primary function of user authentication?
Which of the following is NOT a fundamental means of authenticating user identity?
Which of the following is NOT a fundamental means of authenticating user identity?
In the context of risk assessment for user authentication, what does the 'Assurance Level' primarily describe?
In the context of risk assessment for user authentication, what does the 'Assurance Level' primarily describe?
According to FIPS 199, what impact level would a security breach that causes 'a serious adverse effect' on organizational operations be classified as?
According to FIPS 199, what impact level would a security breach that causes 'a serious adverse effect' on organizational operations be classified as?
Which of the following is a primary vulnerability associated with password authentication?
Which of the following is a primary vulnerability associated with password authentication?
In the UNIX password scheme, what is the purpose of the 'salt'?
In the UNIX password scheme, what is the purpose of the 'salt'?
Why is the original UNIX password scheme now considered inadequate?
Why is the original UNIX password scheme now considered inadequate?
Which of the following is a countermeasure against rainbow table attacks?
Which of the following is a countermeasure against rainbow table attacks?
What is the primary goal of reactive password checking?
What is the primary goal of reactive password checking?
What is a Bloom filter used for in the context of password management?
What is a Bloom filter used for in the context of password management?
Which type of card used as a token includes an embedded microprocessor?
Which type of card used as a token includes an embedded microprocessor?
What distinguishes a memory card from a smart card?
What distinguishes a memory card from a smart card?
What are the three types of memory typically included in smart tokens?
What are the three types of memory typically included in smart tokens?
In the context of smart card communication, what does APDU stand for?
In the context of smart card communication, what does APDU stand for?
Which of the following is a characteristic of electronic identity cards (eID)?
Which of the following is a characteristic of electronic identity cards (eID)?
In biometric authentication, what does the decision threshold (t) primarily determine?
In biometric authentication, what does the decision threshold (t) primarily determine?
What does a 'false nonmatch' represent in the context of biometric authentication?
What does a 'false nonmatch' represent in the context of biometric authentication?
On a biometric measurement operating characteristic curve, what is typically plotted on the x-axis?
On a biometric measurement operating characteristic curve, what is typically plotted on the x-axis?
What generally happens to the false nonmatch rate as the decision threshold (t) is increased?
What generally happens to the false nonmatch rate as the decision threshold (t) is increased?
Which biometric method shown tends to have a lower false match rate at higher security levels?
Which biometric method shown tends to have a lower false match rate at higher security levels?
What is the primary reason for using a logarithmic scale on the axes of biometric operating characteristic curves?
What is the primary reason for using a logarithmic scale on the axes of biometric operating characteristic curves?
In a biometric system, what is the implication of setting an extremely low decision threshold?
In a biometric system, what is the implication of setting an extremely low decision threshold?
An increase in security often leads to what trade-off in biometric systems?
An increase in security often leads to what trade-off in biometric systems?
Which biometric characteristic appears to offer the best balance between false match rate and false nonmatch rate?
Which biometric characteristic appears to offer the best balance between false match rate and false nonmatch rate?
How is the performance of a biometric system typically evaluated?
How is the performance of a biometric system typically evaluated?
What underlying assumption is made when comparing the 'profiles of a biometric characteristic of an imposter and an authorized user'?
What underlying assumption is made when comparing the 'profiles of a biometric characteristic of an imposter and an authorized user'?
If a biometric system's operating point is shifted to drastically reduce the false match rate, what is the most likely consequence for legitimate users?
If a biometric system's operating point is shifted to drastically reduce the false match rate, what is the most likely consequence for legitimate users?
Consider two biometric systems: System A has a high false match rate but a low false nonmatch rate, while System B has a low false match rate but a high false nonmatch rate. In what scenario would System A be preferred over System B?
Consider two biometric systems: System A has a high false match rate but a low false nonmatch rate, while System B has a low false match rate but a high false nonmatch rate. In what scenario would System A be preferred over System B?
A biometric system designer is tasked with developing an authentication system for a highly secure facility with limited user enrollment. Given this constraint, which adjustment strategy would minimize the risk of unauthorized access without unduly hindering legitimate users?
A biometric system designer is tasked with developing an authentication system for a highly secure facility with limited user enrollment. Given this constraint, which adjustment strategy would minimize the risk of unauthorized access without unduly hindering legitimate users?
An extremely advanced biometric system boasts near-zero false match and false nonmatch rates under controlled laboratory conditions. However, when deployed in a real-world, unconstrained environment, its performance degrades significantly. What is the most probable cause for this discrepancy?
An extremely advanced biometric system boasts near-zero false match and false nonmatch rates under controlled laboratory conditions. However, when deployed in a real-world, unconstrained environment, its performance degrades significantly. What is the most probable cause for this discrepancy?
Which of the following is NOT a typical defense against host attacks aimed at user authentication services?
Which of the following is NOT a typical defense against host attacks aimed at user authentication services?
In remote user authentication, what is the primary purpose of using a challenge-response protocol?
In remote user authentication, what is the primary purpose of using a challenge-response protocol?
What is the main vulnerability associated with password-based authentication?
What is the main vulnerability associated with password-based authentication?
In the context of remote user authentication, what does a 'replay attack' involve?
In the context of remote user authentication, what does a 'replay attack' involve?
Which protocol relies on a user providing something they have to verify their identity?
Which protocol relies on a user providing something they have to verify their identity?
What is the function of the hashing function, h(), in the password authentication protocol described?
What is the function of the hashing function, h(), in the password authentication protocol described?
In a dynamic biometric protocol, what additional element is incorporated to enhance security compared to a static biometric protocol?
In a dynamic biometric protocol, what additional element is incorporated to enhance security compared to a static biometric protocol?
What is the purpose of 'password file access control'?
What is the purpose of 'password file access control'?
Which of the following is a primary concern regarding the 'Electronic identity cards' within token-based authentication systems?
Which of the following is a primary concern regarding the 'Electronic identity cards' within token-based authentication systems?
How do 'hashing' and 'salting' enhance password security?
How do 'hashing' and 'salting' enhance password security?
Which of the following attack types specifically targets the user file stored on a host?
Which of the following attack types specifically targets the user file stored on a host?
Given $f(r, h(P(U)))$ represents the expected response in a challenge-response password protocol, altering $f$ to $f(r + k, h(P(U)))$, where $k$ is a session-specific key, primarily defends against what?
Given $f(r, h(P(U)))$ represents the expected response in a challenge-response password protocol, altering $f$ to $f(r + k, h(P(U)))$, where $k$ is a session-specific key, primarily defends against what?
In the context of biometric authentication, what is a key difference between 'static' and 'dynamic' biometric characteristics?
In the context of biometric authentication, what is a key difference between 'static' and 'dynamic' biometric characteristics?
An attacker intercepts a challenge-response sequence $(r, E())$, where $r$ is a random number, and attempts to impersonate the client. However, the attacker only has access to the public key but not the private key needed to decrypt $E()$. What kind of additional security is needed to fully prevent the attacker from successfully authenticating?
An attacker intercepts a challenge-response sequence $(r, E())$, where $r$ is a random number, and attempts to impersonate the client. However, the attacker only has access to the public key but not the private key needed to decrypt $E()$. What kind of additional security is needed to fully prevent the attacker from successfully authenticating?
Consider a scenario where an iris scanner in the UAE system suffers a network disconnection from the central iris database. What is the MOST critical immediate security implication?
Consider a scenario where an iris scanner in the UAE system suffers a network disconnection from the central iris database. What is the MOST critical immediate security implication?
Flashcards
User Authentication
User Authentication
Verifying an identity claimed by or for a system entity.
Identification Step
Identification Step
Presenting an identifier to the security system.
Verification Step
Verification Step
Presenting authentication information that corroborates the binding between the entity and the identifier.
Assurance Level
Assurance Level
Signup and view all the flashcards
Low Potential Impact
Low Potential Impact
Signup and view all the flashcards
Moderate Potential Impact
Moderate Potential Impact
Signup and view all the flashcards
High Potential Impact
High Potential Impact
Signup and view all the flashcards
Password Authentication
Password Authentication
Signup and view all the flashcards
Password Vulnerabilities
Password Vulnerabilities
Signup and view all the flashcards
Salt
Salt
Signup and view all the flashcards
Rainbow Table Attacks
Rainbow Table Attacks
Signup and view all the flashcards
Dictionary attacks
Dictionary attacks
Signup and view all the flashcards
John the Ripper
John the Ripper
Signup and view all the flashcards
Password File Access Control
Password File Access Control
Signup and view all the flashcards
Proactive Password Checking
Proactive Password Checking
Signup and view all the flashcards
Enrollment (Biometrics)
Enrollment (Biometrics)
Signup and view all the flashcards
Biometric Sensor
Biometric Sensor
Signup and view all the flashcards
Feature Extractor
Feature Extractor
Signup and view all the flashcards
Feature Matcher
Feature Matcher
Signup and view all the flashcards
Verification (Biometrics)
Verification (Biometrics)
Signup and view all the flashcards
PACE
PACE
Signup and view all the flashcards
Card Access Number (CAN)
Card Access Number (CAN)
Signup and view all the flashcards
Biometric Authentication
Biometric Authentication
Signup and view all the flashcards
Retinal/Iris Scan
Retinal/Iris Scan
Signup and view all the flashcards
Hand Geometry
Hand Geometry
Signup and view all the flashcards
Voice Recognition
Voice Recognition
Signup and view all the flashcards
Facial Characteristics
Facial Characteristics
Signup and view all the flashcards
Signature Analysis
Signature Analysis
Signup and view all the flashcards
Machine Readable Zone (MRZ)
Machine Readable Zone (MRZ)
Signup and view all the flashcards
Remote User Authentication
Remote User Authentication
Signup and view all the flashcards
Eavesdropping
Eavesdropping
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Challenge-Response Protocol
Challenge-Response Protocol
Signup and view all the flashcards
Denial-of-Service (DoS)
Denial-of-Service (DoS)
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Static Biometrics
Static Biometrics
Signup and view all the flashcards
Iris Scan
Iris Scan
Signup and view all the flashcards
Eavesdropping (Physical)
Eavesdropping (Physical)
Signup and view all the flashcards
Host Attacks
Host Attacks
Signup and view all the flashcards
Client Attacks
Client Attacks
Signup and view all the flashcards
Type I error (FRR)
Type I error (FRR)
Signup and view all the flashcards
Type II error (FAR)
Type II error (FAR)
Signup and view all the flashcards
Biometric Characteristics
Biometric Characteristics
Signup and view all the flashcards
ROC Curve (Biometrics)
ROC Curve (Biometrics)
Signup and view all the flashcards
False Match Rate (FMR)
False Match Rate (FMR)
Signup and view all the flashcards
False Non-Match Rate (FNMR)
False Non-Match Rate (FNMR)
Signup and view all the flashcards
Decision Threshold (Biometrics)
Decision Threshold (Biometrics)
Signup and view all the flashcards
Biometric Profile
Biometric Profile
Signup and view all the flashcards
Matching Score
Matching Score
Signup and view all the flashcards
Declared Match
Declared Match
Signup and view all the flashcards
False Nonmatch Rate Increase
False Nonmatch Rate Increase
Signup and view all the flashcards
False match rate decrease
False match rate decrease
Signup and view all the flashcards
Security Increase
Security Increase
Signup and view all the flashcards
Convenience increase
Convenience increase
Signup and view all the flashcards
Enlinment equality
Enlinment equality
Signup and view all the flashcards
Single Numeric Value
Single Numeric Value
Signup and view all the flashcards
Probability Density Function
Probability Density Function
Signup and view all the flashcards
Study Notes
- Chapter 3 discusses User Authentication for computer security, lecture 2, course 23164404-3, at Umm Al-Qura University.
- RFC 4949 defines user authentication as verifying an identity claimed by or for a system entity.
Authentication Process
- Authentication is a fundamental building block and primary line of defense in computer security.
- Authentication forms the basis for access control and user accountability.
- The identification step involves presenting an identifier to the security system.
- The verification step involves presenting or generating authentication information to corroborate the binding between the entity and the identifier.
- E-Authentication uses a token and credential for authentication architecture.
Authentication Methods
- Authenticating the identity of a user can be based on three means:
- Something the user knows, like a password, personal identification number, or answers to prearranged questions.
- Something the user has, like tokens, smartcards, electronic keycards, or physical keys.
- Something the user is, defined as static biometrics, such as a fingerprint, retina, or face.
- Dynamic biometrics, which could be classified as something a user does, such as voice pattern, handwriting, or typing rhythm.
Risk Assessment
- Risk Assessment for User Authentication uses a risk assessment that has three separate concepts:
- Assurance Level.
- Potential Impact.
- Areas of Risk.
Assurance Level
- Assurance levels describe an organization's degree of certainty that a user has presented credentials that refer to their identity.
- It's defined specifically by:
- The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued.
- The degree of confidence that the individual using the credential is the individual to whom the credential was issued.
- The Four Levels of Assurance:
- Level 1 has little or no confidence in the asserted identity's validity.
- Level 2 has some confidence in the asserted identity's validity.
- Level 3 has high confidence in the asserted identity's validity.
- Level 4 has a very high confidence in the asserted identity's validity.
Potential Impact
- FIPS 199 defines three levels of potential impact on organizations or individuals in case of a security breach:
- Low where authentication error could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals
- Moderate where authentication error could be expected to have a serious adverse effect
- High where authentication error could be expected to have a severe or catastrophic adverse effect
Potential Impact Categories
- Potential impact categories for authentication errors, and their assurance level impact profiles:
- Inconvenience, distress, or damage to standing/reputation: Low to High
- Financial loss or organization liability: None to High
- Harm to organization programs or interests: None to High
- Unauthorized release of sensitive information: None to High
- Civil or criminal violations: None to High
Password Authentication
- Password authentication is a widely used line of defense against intruders.
- Users must provide their name/login and password.
- The system compares the password with the one stored for that specified login.
- The user ID:
- Determines that the user is authorized to access the system
- Determines the user's privileges
- Is used in discretionary access control
Password Vulnerabilities
- Common password vulnerabilities include:
- Offline dictionary attack.
- Password guessing against a single user.
- Workstation hijacking.
- Electronic monitoring.
- Specific account attack.
- Popular Password attack.
- Exploiting user mistakes.
- Exploiting multiple password use.
Original UNIX Scheme
- The UNIX implementation originally involved:
- Up to eight printable characters in length.
- 12-bit salt used to modify DES encryption into a one-way hash function.
- Zero value repeatedly encrypted 25 times.
- Output translated to an 11-character sequence.
- The scheme is now regarded as inadequate.
- The scheme is still often required for compatibility with existing account management software or multi-vendor environments.
Improved Implementations
- OpenBSD uses a Blowfish block cipher-based hash algorithm called bcrypt.
- It is the most secure version of the Unix hash/salt scheme
- Uses 128-bit salt to create a 192- bit hash value
- A recommended hash function is based on MD5.
- Has a salt of up to 48-bits.
- Password length is unlimited.
- Produces 128-bit hash.
- Uses an inner loop with 1000 iterations to achieve slowdown.
Password Cracking
- Dictionary attacks involve developing a large dictionary of possible passwords and trying each against the password file.
- Each password must be hashed using each salt value and then compared to stored hash values
- Rainbow table attacks pre-compute tables of hash values for all salts.
- The attack is performed with a mammoth table of hash values.
- Can be countered by using a sufficiently large salt value and a sufficiently large hash length.
- Password crackers exploit the fact that people choose easily guessable passwords, and shorter password lengths are also easier to crack.
- John the Ripper is an open-source password cracker first developed in 1996
- Uses a combination of brute-force and dictionary techniques.
Modern Approaches
- Modern password approaches include enforcing a complex password policy.
- This forces users to pick stronger passwords.
- Password-cracking techniques have also improved.
- This is due to the processing capacity for password cracking increasing dramatically.
- Sophisticated algorithms are now being used to generate potential passwords.
- Studying examples and structures of actual passwords in use is common.
Password File Access Control
- Password File Access Control can be used to block offline guessing attacks by denying access to encrypted passwords.
- Weaknesses can include the Shadow password file, weaknesses in operating systems, accidental permissions making the file readable, users with the same password on other systems, access from backup media, and sniffing passwords in network traffic.
Password Selection Strategies
- Strategies for achieving better password selection include:
- User education, so users understand the importance of using hard-to-guess passwords.
- Computer generated passwords if users have trouble remembering them.
- Reactive password checking where the system periodically runs its own password cracker to find guessable passwords.
- Complex password policy, where users are allowed to select their own password, however the system checks to see if the password is allowable, and if not, rejects it.
- The goal is to eliminate guessable passwords while allowing the user to select a password that is memorable.
Proactive Password Checking
- Proactive Password Checking involves using:
- Password cracker.
- Rule enforcement.
- Bloom Filter.
Tokens
- Tokens come in the form of:
- Memory cards
- Smart cards
- Electronic Identity cards
Memory Cards
- Memory cards can store but not process data.
- The most common memory card is the magnetic stripe card.
- Memory cards can include an internal electronic memory.
- Memory cards rely solely on physical access.
- For example, Hotel room keycards.
- For example, ATM Debit cards.
- A special reader is required.
- Memory cards provide significantly greater security when combined with a password or PIN.
- Drawbacks of memory cards include:
- Requiring a special reader limits usefulness.
- The loss of a token compromises physical access.
- User dissatisfaction is seen because of extra authentication steps/devices.
Smart Tokens
- Physical characteristics include:
- Embedded microprocessor.
- A smart token that looks like a bank card.
- The functionality is installed into calculators, keys, and small portable objects.
- Authentication protocol includes:
- Classified into three categories:
- Static.
- Dynamic password generator.
- Challenge-response.
- Smart tokens typically include three types of memory:
- Read-only memory (ROM) that stores data that doesn't change during the card's life.
- Electrically erasable programmable ROM (EEPROM) that holds application data and programs.
- Random access memory (RAM) that holds temporary data generated when applications are executed.
Electric Identity Cards
- The most advanced deployment for electronic identity cards is the German card "neuer Personalausweis"
- Use of a smart card as a national identity card for citizens:
- Such cards can provide stronger proof of identity and can be used in a wider variety of applications.
- Electronic functions and data for eID cards:
- ePass with Face image; two fingerprint images (optional), MRZ data for biometric identity verification
- Online applications read family and given names; artist name and doctrinal degree: date and place of birth; address and community, ID; for age verification
- Password Authenticated Connection Establishment (PACE) can be used.
- It ensures that the contactless RF chip in the eID card cannot be read without explicit access control
- For online applications, access is established by the user entering the 6-digit PIN (which should only be known to the holder of the card)
- For offline applications, either the MRZ printed on the back of the card or the six-digit card access number (CAN) printed on the front is used.
Biometric Authentication
- Biometric Authentication attempts to authenticate an individual based on unique physical characteristics; it is based on pattern recognition.
- Authentication is technically complex and expensive when compared to passwords and tokens.
- Physical characteristics used include:
- Facial characteristics
- Fingerprints
- Hand geometry
- Retinal pattern
- Iris
- Signature
- Voice.
Remote User Authentication
- Authentication over a network, the Internet, or a communications link is complex.
- Remote user Authentication has additional security threats such as:
- Eavesdropping, capturing a password, replaying an authentication sequence that has been observed
- Remote User Authentication relies generally on a challenge-response protocol to counter threats.
Attacks
- Common attacks include:
- Client Attack
- Host Attack.
- Eavesdropping.
- Replay.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.