Title: Authentication and Access Control in Distributed Systems
1Title Goes Here
Toward Fixing the Compliance Defects of Public
Key Cryptography
Mike Reiter Professor of ECE and CS Carnegie
Mellon University
2Compliance Defects in PKIDavis 1996
- Compliance defect a rule of operation that is
difficult to follow and that cannot be enforced
3Compliance Defects as a User Interface Issue
- Users have neither
- The patience to verify a large string of hex
digits
- The capacity to remember strong cryptographic keys
- Problem gets worse with longer keys and hashes
4Keeping it in Perspective
- Compliance defects are not unique to PKI
- Suretys digital notary service relies on users
to compare a hash published in the New York Times
to a computed one - File encryption poses similar challenges as
protecting a private key does
- These compliance defects are not the only user
interface problem for cryptographic (or security)
systems Kent 1997 Whitten Tygar 1999
5How to Fix Compliance Defects
- Remember, a compliance defect is
- A rule of operation that is
- difficult to follow ? cannot be enforced
- To fix a compliance defect, one conjunct must be
negated - That is, either
- Improve the user interface
- Impose an enforcement mechanism
6Imposing an Enforcement Mechanism
- Protecting the private key
- Give the user her private key on a PIN-activated
smartcard - Choose the password for the user
- Force the user to choose a stronger password
(e.g., proactive password checking) - Verifying the roots public key
- Somehow do it for the user (a la Firefox and IE)
7Improving the User Interface
- Make the user interface more pleasant
- Pleasant ? graphical
- Pictures are easier to remember than words
- Some cognitive theories
- Pictures share fewer common perceptual features
and so must be discriminated from a smaller set
of possible alternatives - Human brain has separate verbal and non-verbal
memories - Recognizing a face but not the persons name
- Recognizing a melody but not its name
- Or keep the same interface but make it more
effective
8SnowflakesLevien 1996
- A graphical approach to displaying hash outputs
- Computed in lt 200 lines of C
9Random ArtBauer 1998 Perrig Song 1999
- Another approach to visualizing hash outputs
- Hash value used as seed to generate a function f
?1,12 ? ?1,13 - f(x, y) is the RGB triple for pixel at (x, y)
10Random Art How it Works
- Function f is generated from a grammar that
permits coin flips - All coin flips generated pseudorandomly from seed
- Grammar can include other functions, e.g.,
- sin
- cos
- exp
- square root
11Graphical PasswordsBlonder 1996 Jermyn et al.
1998
- Suitable mainly for PDAs permitting stylus input
- Useful for encrypting private key, or seeding its
generation
pen-up
Sequence (2,2)(3,2),(3,3),(2,3),(2,2),(2,1),(5,5
) Key hash(Sequence)
12Security of Graphical Passwords
- How might one argue that graphical passwords are
more secure than text ones? - Show that number of memorable graphical passwords
exceeds number of memorable text passwords - How does one quantify the memorable graphical
passwords?
13Complexity of a Graphical Password
Grammar
Program Digit Digit Block Block Stmt
Block Stmt Instr Repeat Digit Block
End Instr Up Down Right Left Penup
Pendown Digit 1 2 3 4 5
- Complexity length of shortest program that
generates the password
Complexity 26
14Memorable Password Space
Comp 24
Comp 39
Comp 42
Surpasses size of the dictionary used in Klein
1990.
15Encryption Application for Palm Pilot
Plaintext
16The Challenge of Graphical Schemes
- How secure are they, really?
- Can an attacker generate a key for which the
snowflake or art depiction fools someone with
non-negligible probability? - Depends on lighting, size of representation,
printer quality, - Is the entropy of a graphical password really
better than a text password? - Only user studies will tell
17Making the Old Interface More Effective
- Mainly applies to private key protection
- Less so for root key validation
- Old interface password
- Making it more effective making dictionary
attacks harder - Two approaches we will discuss here
- Use the network
- Use the user
18Using the NetworkLomas et al. 1989 Bellovin
Merritt 1992 Perlman Kaufman 1999
- Store private key in a protected server that
authenticates user before sending the private key
- Eavesdropper gains nothing to use in offline
dictionary attack - Forces dictionary attacks to occur online
- Server can detect and stop them
- But break-in at server leaks private key
- Possibly after an offline dictionary attack
19Reducing Trust in the ServerMacKenzie Reiter
2001
- Keep the key at the client, but in a disabled
state
- Break-in at server leaks nothing
- Online dictionary attack possible only after
device is captured - Server can again detect and stop the attack
- Offline attack requires capture of both client
device and server
20Reducing Trust in the ClientMacKenzie Reiter
2001 Boneh et al. 2001 c.f., Ganesan 1985
- Can disable the device if stolen
- Even if attacker knows the users password
- Same properties as before, plus disabling
- Known techniques depend on particular form of
private key - All use function sharing primitives
21Server Delegation
- Delegation enables use of local server
- Or a smartcard for offline operation
- Device can unilaterally revoke delegated servers
22Using the UserSoutar et al. 1996 Davida et al.
1998 Juels Wattenberg 1999 Monrose et al.
1999
- Use biometric features during entry of a password
to construct a hardened password - Hardened password useful for key encryption
- Portables not equipped with hardware for most
biometric techniques, but do typically have
or
23Initialization
24Reconstructing the Hardened Password
- Table decrypted using entered password
- Biometric features induce cut through table
- One element per row is selected
- Selected elements used to reconstruct hardened
password
25Hardening the Hardened Password
- System learns users biometric features over
repeated logins
- Pieces not used by correct user are destroyed
- Enhances protection even against imposter who
knows the password
26Dictionary Attacks
- For each incorrect password guess, decrypted
table is random
- For the correct password guess, decrypted table
is correct one
27Keystroke Experiments
Guessing Entropy
False Negative Rate
481 recorded logins from 20 users typing the same
8-character password. 15 features.