The Riddle of the Sphinx

Transcription

The Riddle of the Sphinx
Authorization
The Riddle of the Sphinx
Riddle of the Sphinx
The Sphinx is said to have guarded the entrance to the
Greek city of Thebes, and to have asked a riddle of
travellers to allow them passage, strangling and devouring
anyone unable to answer.
Which creature has one voice and yet
becomes four-footed and two-footed and
three-footed?
Brown University CS1951-E
CC BY-SA 2.5
Source: https://en.wikipedia.org/wiki/Sphinx#The_Riddle_of_the_Sphinx
Riddle of the Sphinx
The Sphinx is said to have guarded the entrance to the
Greek city of Thebes, and to have asked a riddle of
travellers to allow them passage, strangling and devouring
anyone unable to answer.
Man—who crawls on all fours as a baby,
walks on two feet as an adult, and uses a
walking stick in old age.
Brown University CS1951-E
CC BY-SA 2.5
Source: https://en.wikipedia.org/wiki/Sphinx#The_Riddle_of_the_Sphinx
What is authorization?
● Acquiring authority by proving something
about yourself
○ Who are you?
○ What rights do you have?
○ What properties do you have?
Brown University CS1951-E
CC BY-SA 2.5
Rights you might have
● I’m allowed…
○
○
○
○
In this room/building
To access this file
To drive a car
To enter this country
Brown University CS1951-E
CC BY-SA 2.5
Properties you might have
●
●
●
●
●
Age (e.g. to be served alcohol)
Employment status (e.g. military, unemployment, etc)
Religion (e.g. Birthright Israel)
Health status (e.g. blood type, insurance, military job)
Country of origin (e.g. to prove work eligibility)
Brown University CS1951-E
CC BY-SA 2.5
Now PROVE IT!
Brown University CS1951-E
CC BY-SA 2.5
Source: http://mrconservative.com/files/2014/02/2014.02.05-mrconservative-52f1d981c8e43
jpg
Usual Three-step Authorization Process:
Identify, Authenticate, Authorize
● Identity is an unique identifier for a person
○ E.g. name, social security no., login
● Authentication is a process for proving a person’s identity.
○ E.g. ID card, birth certificate, password
● Authorization is a process for proving rights.
○ Can use authenticated identity, but not always needed!
Brown University CS1951-E
CC BY-SA 2.5
Methods of Proof
●
●
●
●
Something you have
Something you are
Something you know
Something you can do
Brown University CS1951-E
CC BY-SA 2.5
Something you have
● Physical object that grants access
● Examples
○ Key
○ ID Card
○ Token generator for two-factor authorization
(Google Authenticator, Authy, RSA SecurID)
○ King’s Seal (in wax)
Brown University CS1951-E
CC BY-SA 2.5
Something you have (cont.)
● Strengths
○ Easily transferable
● Weaknesses
○ Easily transferable
○ Can be lost or stolen
○ Can be forged
■ e.g. a key can be made from photos
Brown University CS1951-E
CC BY-SA 2.5
Something you are
● Biometric information
● Examples
○
○
○
○
○
Fingerprints
Facial Recognition
Retinal Scan
DNA Test
Smell (for animals)
Brown University CS1951-E
CC BY-SA 2.5
Something you are (cont.)
Jacob, Esau,
and the first
biometric
authentication
system
Brown University CS1951-E
CC BY-SA 2.5
Something you are (cont.)
● Strengths
○ Non-transferable
○ Usually identifies individual
● Weaknesses
○ Forgeable
■ Computer Chaos Club forged fingerprints from
photographs alone
○ Can be lost (ie, loss or degradation)
○ Can’t be changed
Brown University CS1951-E
CC BY-SA 2.5
Jan Krissler says he replicated the fingerprint of defence minister Ursula von der Leyen using
pictures taken with a "standard photo camera".
Brown University CS1951-E
CC BY-SA 2.5
Something you know
● Information held by limited number of parties
● Examples
○
○
○
○
○
○
Password
API token
Encryption key
Combination to lock
Secret handshake
Details of the crime
Brown University CS1951-E
CC BY-SA 2.5
Something you know (cont.)
● Strengths
○ Easy to transport
○ Can be changed
○ Easily transferrable/easy to duplicate
● Weaknesses
○ Verifier learns the secret
○ Can be forgotten
○ Easy to duplicate
Brown University CS1951-E
CC BY-SA 2.5
Something you can do
● Ability to perform unique task
● Examples
○
○
○
○
Signature
Voice recognition
CAPTCHA
Whale songs
Brown University CS1951-E
CC BY-SA 2.5
Something you can do (cont.)
“Recorded in the Book of Judges, chapter 12, after the inhabitants of
Gilead inflicted a military defeat upon the tribe of Ephraim, the surviving
Ephraimites tried to cross the Jordan River back into their home
territory and the Gileadites secured the river's fords to stop them. In
order to identify and kill these refugees, the Gileadites required each
refugee to say the word shibboleth. The Ephramite dialect did not
contain the "sh" sound and so those who pronounced the word as
sibboleth were identified as Ephramites and killed.”
Source: https://en.wikipedia.org/wiki/Shibboleth
Brown University CS1951-E
CC BY-SA 2.5
Something you can do (cont.)
● Strengths
○ Difficult (but not impossible) to forge
■ e.g. handwriting
● Weaknesses
○ Ability can be lost, say due an accident
Brown University CS1951-E
CC BY-SA 2.5
Multifactor Authentication
● Use multiple factors for authentication or authorization
○ e.g. password + token generator
(something you know +
something you have)
● Unlimited factors can be combined
○ e.g. Bloomberg B-Unit requires
■ fingerprint
■ token generator
■ password
Source: https://storage.googleapis.com/support-kms-prod/SNP_2909001_en_v0
Brown University CS1951-E
CC BY-SA 2.5
Multifactor Authentication
● Strengths
○ Must compromise both factors
to break security
● Weaknesses
○ Can be more burdensome to
use
Source: https://storage.googleapis.com/support-kms-prod/SNP_2909001_en_v0
Brown University CS1951-E
CC BY-SA 2.5
Multifactor Authentication
For usability, tradeoff is important.
Google two-factor authentication only
uses the second factor (phone) to
authenticate the browser, which is
then trusted for 30 days. During that
time, you only need a password.
Source: https://storage.googleapis.com/support-kms-prod/SNP_2909001_en_v0
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● Often these schemes can be broken down into
○ Identification (who are you?)
○ Authentication (prove it)
○ Authorization (what are you allowed to do?)
● Examples:
○ User login (username/password/file access)
○ Some transportation (ticket with name/ID card/train ride)
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● However, this model often doesn’t apply
○ Identification/authentication can be done in one step
○ Authorization can occur without authentication
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● Identification/authentication in one step
● Examples:
○ When you see/hear somebody you know
○ Most uses of SSNs
■ Bad because it’s both a public identifier (that
everyone needs to know) and an authenticator (that
only you should know)
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● Authorization without authentication
● Examples:
○ Door keys
○ Postage stamps
○ Movie tickets
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● Subtleties
○ Identification doesn’t have to be of an individual
■ Can be a group (e.g., Gileadites)
■ Authorization is then a property common to members
● Ability to pronounce “shibboleth”
● Knowledge of the 1940 World Series Champions
Brown University CS1951-E
CC BY-SA 2.5
Identification, Authentication, Authorization
Revisited
● Subtleties
○ Identifiers aren’t always unique
■ John Savage (IMDB)
■ Johnnie Thomas and John Thomas
Christopher
■ Singapore’s exoneration documents
Brown University CS1951-E
CC BY-SA 2.5
source: http://www.imdb.com/name/nm0001698/
Identification, Authentication, Authorization
Revisited
● Subtleties
○ Identification doesn’t have to be a name
■ username or user ID
■ ATM card number
Brown University CS1951-E
CC BY-SA 2.5
Summary
● Often broken into three steps
○ Identification, Authentication, and Authorization
● But this isn’t necessary
● Four ways to prove authentication or
authorization
○ Something you have/are/know/can do
Brown University CS1951-E
CC BY-SA 2.5
Coming up next...
● Two lectures on cryptography
(Anna Lysyanskaya)
● One lecture on password security
Brown University CS1951-E
CC BY-SA 2.5