1 / 24

Outline What is an authentication protocol? Password Authentication Scheme

CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia University olaseind@mix.wvu.edu. Outline What is an authentication protocol? Password Authentication Scheme

sissy
Download Presentation

Outline What is an authentication protocol? Password Authentication Scheme

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 736A methodology for Analyzing the Performance of Authentication ProtocolbyLaseinde Olaoluwa Peter Department of Computer ScienceWest Virginia Universityolaseind@mix.wvu.edu

  2. Outline • What is an authentication protocol? • Password Authentication Scheme • Token Based Authentication (Smart card) • Biometric Authentication Protocol • Multiple Authentication System

  3. What are authentication protocols? • The different schemes used to grant or decline access to a place/location. • Establish the identity of a person. • Establish a communication securely

  4. Outline • What is an authentication protocol? • Password Authentication Scheme • Token Based Authentication (Smart card) • Biometric Authentication Protocol • Multiple Authentication System

  5. Password Authentication scheme • Most widely used authentication protocol • Encryption and decryption of password are done using algorithms • Symmetric and Asymmetric encrypting techniques

  6. Performance of some algorithms

  7. Advantages • Least expensive authentication method to use. • No need to carry hardware device. • User IDs and passwords can be changed at the user's choice. Disadvantages • Not fully reliable when used for making financial transactions remotely, such as fund transfers and bill payments through an Internet banking channel. • Security depends on the users' ability to maintain the user ID and password secret.

  8. Outline • What is an authentication protocol? • Password Authentication Scheme • Token Based Authentication (Smart card) • Biometric Authentication Protocol • Multiple Authentication System

  9. Token based Authentication (smart card) • Takes the form of ID cards e.g. student card, debit/credit cards, insurance cards gives access to Laboratories and other facilities on campus, ATMs and Library. • Comes with single or multiple processors.

  10. Advantages • More secure to use than the normal user ID or password. • Difficult for non-authorized users to extract the private key when stored on a smart card. Disadvantages • Requires users to carry a smart card. • Need for regular renewals

  11. Some brands of smart cards

  12. Outline • What is an authentication protocol? • Password Authentication Scheme • Token Based Authentication (Smart card) • Biometric Authentication Protocol • Multiple Authentication System

  13. Biometric Authentication Defines “who you are” not “what you have” or “what you can remember”

  14. Biological and behavioral characteristics • Finger prints Ridges and valleys Minutiae • Face • Hand/finger geometry • Iris • Voice

  15. Definitions • False Acceptance Rate (FAR): Probability that a biometric system falsely recognizes different characteristics as identical, thus failing to reject, for example, a potential intruder. • False Rejection Rate (FRR): Probability that a biometric system falsely recognizes identical characteristics as being different, thus, for example refusing to accept an authorized person. • False Match Rate (FMR):This indicates the proportion of persons who, when comparing characteristics, were falsely accepted.

  16. Definitions continued… • False Non-Match Rate (FNMR): This indicates the proportion of persons who, when comparing characteristics, were falsely not accepted. • Failure to Acquire (FTA): This is the attempts that were previously rejected due to a low quality of the image, this is also the proportion of times the biometric device fails to capture a sample when the biometric characteristic is presented to it. • Failure to Enroll (FTE):This is a measure of the proportion of users that cannot be successfully enrolled in a biometric system

  17. Performance of biometric systems

  18. Efficiency in image capturing process.

  19. Relationship between the False match rate and False non-match • Performance in terms of effectiveness

  20. Performance in terms of effectiveness • A comparison of the false accept rate and the false reject rate

  21. Advantages • Can be used for accessing high-security systems and sites • Different options are available, finger print, iris, voice, hand geometry, face. • You do not need to carry any physical item. Disadvantages • It could be expensive e.g cost of scanners, support and maintenance • High deployment cost • May not be suitable for mass-consumer deployment • Performance is not 100%

  22. Outline • What is an authentication protocol? • Password Authentication Scheme • Token Based Authentication (Smart card) • Biometric Authentication Protocol • Multiple Authentication System

  23. Multiple authentication System • Having a combination of two or more authentication protocols • ATM machine which makes use of both the smart card and also a pin for authentication.

  24. Questions?

More Related