Computer Security lecture notes Copyright (C) 2008 Mark Dermot Ryan
The University of Birmingham
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License,

Authentication

Authentication is the process by which a user, platform, service or software establishes its identity with another agent. Authentication of services (e.g., e-commerce web sites) is typically done by the public key of the service, certified by a certificate authority. Authentication of downloaded software (e.g. by Microsoft authenticode) is typically done by signing (a hash of) the software with, again, a certified key.  In the case of user-to-machine authentication, typical methods include passwords, bank card PINs, smart cards, and RSA-type key fobs.

Authentication of users

This lecture focusses on authentication of users.  Authentication methods should be

Authentication and Authorisation

They are different. Authentication is about verifying the identity of the user. Authorisation is about deciding whether the user (once identified) should be granted access to particular resources. This lecture is just about authentication. Later, we look at authorsation.

Methods of authentication

Authentication may be based on
Since these modes of authentication each have advantages and disadvantages, in some situations one may use "two factor" or "multi-factor" authentication. For example, for withdrawing money you use your bank card (something that you have), and your PIN (something that you know). If an attacker has only one of these, he cannot withdraw money from your account.

Passwords

Passwords are by far the most common means of authentication in computing, because they require no special hardware. But they have many disadvantages.

Challenge-response systems

They are like passwords, but better because they address the problems of eaves-dropping, and masquerading, and password theft. They work as follows. At registration time,
At login time,

It is a bit more complicated for the user, but has the advantage than an eavesdropper or keylogger would take many sessions to find out the whole pass phrase.

Competition

Suppose the passphrase has 20 characters, and the system asks for three randomly chosen characters each time, as in this example. How many sessions must an attacker observe in order to have a 50% chance of having obtained the full password?

Smart cards

Smart cards are tamper-resistant devices with a small amount of memory. Usually they also have a processor, and are capable of carrying out computations, such as encryption/decryption and digital signing. Smart cards are designed to be impossible to duplicate. They're a good way of autheiticating users, provided you are happy with their transferability. Of course they can be used in conjunction with PINs or passwords to reduce their transferability. 

RSA key fobsRSA key fob

They are battery powered and display a sequence of numbers, typically 6 digits in length, changing every 10 seconds. When you authenticate to a remote server, you type the number currently displayed on the keyfob. The server is generating the same sequence of numbers, synchronised with the key fob. Usually, typing the previously displayed number or the next number is accepted, to allow for the fob and the server getting out of synch. The server may try to compensate (slow down or speed up the sequence for a user) if the fob is going too slow or too fast. Useful if presence of a smart card reader can't be assumed, e.g., authenticating from an internet cafe.

Key fobs work by displaying a substring of H(i), then of H(H(i)), then of H(H(H(i))), . . ., and so on, where i is some initial value and H a secure hash function. The initial value of i should be kept secret. Only a substring of the output of the hash value should be displayed, to avoid an attacker generating the sequence by applying H successively to the number displayed.

Biometric authentication

BiometricsBiometrics at disney (ancient Greek: bios ="life", metron ="measure") is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioural traits. In contrast with probably every other method of authentication, biometric authentication aims to be completely non-transferable.

Examples of physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, while examples of mostly behavioural characteristics include signature, gait and typing patterns. Voice is considered a mix of both physical and behavioural characteristics.

Operation


As mentioned, during authentication the user usually declares her identity, and the system verifies it. This is called verification. One can use biometrics to perform identification instead of just verification, but this is computationally much more expensive because the matching algorithm (which is costly) has to be run much more often.

The matching algorithm is typically complicated, and inexact. No two measurements of a person's biometric data will match exactly. To address this problem

Biometric systems work best in supervised situations, e.g., airports, retail, where the possibilities of defeating the system by misusing it are reduced. The challenge of using biometrics in unsupervised situations, e.g. authentication over the internet, has not really been addressed.

Kinds of biometric systems

Fingerprintsfinger minutiae

Fingerprints are converted into a template by identifying the relative positions of minutiae, which are the ridge-endings and ridge-bifurcations (and perhaps other identifiable detail, such as deltas).  In UK, fingerprints are required to match on 16 points (minutiae), and a UK police expert estimated that this will happen by chance only between one in 4bn and one in 10bn matches. Greece attempts 10 matching minutiae, Turkey 8.

But fingerprints wear out with age, especially for manual workers, and some (quite rare) people simply don't have them. They can also change, e.g. through injury.

Iris codes

Like fingerprints, the pattern on people's irises are apparently unique to every individual, and because they are protected by the eye's cornea, they don't wear out with age. A signal processing technique (called Gabor filters) has been found which extracts the information from an image of the iris to a 256-byte code. It involves a circular wavelet transform taken at a number of concentric rings. Two codes computed from the same iris will typically match in 90% of their bits. The number of equal bits is easily computed: just xor the codes together and count the number of zero bits. Iris false accept rates are very low; 0 in tests by the US Department of Energy [1].

Some systems that don't really work (yet?)

Performance

In context, the performance of a biometric measure is usually defined in terms of

In real-world biometric systems the Biometric error rate tradeoffFAR and FRR can typically be traded off against each other by changing some parameters. One of the most common measures of real-world biometric systems is the rate at which both accept and reject errors are equal: the equal error rate (EER). The lower the EER, the more accurate the system is considered to be.

Stated error rates sometimes involve idiosyncratic or subjective elements. For example, one biometrics vendor set the acceptance threshold high, to minimize false accepts. In the trial, three attempts were allowed, and so a false reject was counted only if all three attempts failed. At the same time, when measuring performance biometrics (e.g. writing, speech etc.), opinions may differ on what constitutes a false reject. If a signature verification system is trained with an initial and a surname, can a false reject be legitimately claimed when it then rejects the signature incorporating a full first name?

Some statistics scattered in [1, Chapter 13] (seems very hard to make direct comparisons):


FAR
FRR
EER
Chance match
Fingerprint



1 in 4bn or 10bn
Iris codes
"0"

1 in 1M

Iris codes
1 in 1 trillion
1 in 10K


Facial features


10% or 20%

Hand geometry


0.1%-0.2%
UK bank target
1%
0.01%



A comparison of biometrics

The figure from Yun [2] compares several biometrics with each other against seven criteria. Comparison of biometrics


Yun ranks each biometric based on the categories as being either low, medium, or high. A low ranking indicates poor performance in the evaluation criterion whereas a high ranking indicates a very good performance.

Is biometric data secret?

Some authors express the concern that once a fingerprint or other biometric source has been compromised, it is compromised for life, because users can never change their fingerprints or other biometric data. This appears to be based on the misconception that biometric data should be considered secret, like a password, and therefore capable of being compromised. Biometric data is not secret, since everyone leaves their fingerprints on everything they touch, images of people's faces are in the public domain, etc.

Many vendors and system designers do not seem to accept this point and build systems which rely on the secrecy of biometric data.

Biometric data should not be considered secret, but devices should ensure liveness in order to guarantee against replay attacks. This can be achieved by

Other concerns

Privacy

All my transactions can be linked, e.g., my accesses to the sports centre can be lined to my banking records, to my employment records, to my email, etc. Other forms of authentication don't have this problem, because e.g. the identity I present to an email system is used only on that system. Identity theft may be enhanced by the frequent use of people's biometric identities.

Injury

Some believe this technology can cause physical harm to an individual using the methods, or that instruments used are unsanitary.  Additionally, desperate criminals could kidnap or amputate fingers from individuals they wish to impersonate.

Exclusivity

Every biometric system will exclude some individuals, e.g. amputees, disabled people or people with congenital defects. Biometric engineers sometimes refer to such people as goats. But it is a serious issue, especially in politically sensitive situations. Backup systems have to be introduced, but they can also be problematic since they may cause embarassment to those having to use them, and can also be a target for villains who pretend to be disabled if the backup system is more vulnerable than the biometric one.




Remarks on probability

The Birthday "paradox" is the surprising answer to this question: how many people must I gather in a room in order to have a probability >0.5 that two of them share the same birthday? (We assume that the birthdays are distributed randomly.) The answer is lower than one might guess: 23. Compare that with this question: how many people must I gather in a room in order to have a probability >0.5 that one of them share the same birthday as me? The answer is much greater: 253.

Suppose there are N possible biometric templates, and suppose that individuals' biometric codes are randomly distributed in this space. Now take a set of n people.
Putting this into context, suppose there are 1 billion values of a particular biometric, and suppose again that the values taken by individuals are uniformly distributed. Then n=693,147,100 to get a 0.5 chance of matching with a given individual. But n=26,327 to get a 0.5 chance of finding two matching people.



References

[1] Ross Anderson, Chapter 13 of Security Engineering. Wiley, 2001.  Chapter 13 (Biometrics) [2] Yun, Yau Wei. The 123 of Biometric Technology, 2003.  http://www.itsc.org.sg/synthesis/2002/biometric.pdf

Some more refs