Date: October 16, 2013 Homework due: Oct. 18 at 5:00pm
Attributes that identify you
What you know
What you have
What you are
Where you are
Passwords
How to pick them (and what to look out for)
Problem: common passwords
Complex passwords
Pass-phrases
How they are stored
In the clear (readable only by root or the authentication system
Enciphered (key must be available)
Cryptographically hashed; also, salted
How long they are good for (password aging)
Tracking previous passwords vs. expire after n days
One-time passwords (use once only)
How people try to get your password
Exhaustive search: password is 1 to 8 chars, say 96 possible chars; it’s about 7×1015 guesses
Inspired guessing: think of what people would like (see above)
Random guessing: can’t defend against it; bad login messages aid it
Scavenging: passwords often typed where they might be recorded as login name, in other contexts, etc.
Ask the user: very common with some public access services
Challenge-response
Computer issues challenge, user presents response to verify secret information known or item possessed
Example operations: f(x) = x+1, x random; string (for users without computers); something based on time of day; computer sends E(x), you answer E(D(E(x))+1)
Note: password never sent on wire or network
Biometrics
Depend on physical characteristics
Examples: pattern of typing (remarkably effective), retinal scans, etc.
Location
Bind user to some location detection device (human, GPS)