graphical password authentication using hmac

29
Passwords Presented by: Lakshmi.V Arpana Shree.A

Upload: arpana-shree

Post on 13-May-2015

450 views

Category:

Technology


3 download

DESCRIPTION

Graphical Password authentication using Hmac.This ppt expain on differnt kinds of GPA. and how an hash function is generated

TRANSCRIPT

Page 1: Graphical Password authentication using Hmac

Passwords

Presented by: Lakshmi.V Arpana

Shree.A

Page 2: Graphical Password authentication using Hmac

Outline

GPAIntroduction Overview of the Authentication MethodsThe survey

Recognition Based Techniques Recall Based Techniques

Discusssion Security Usability

Conclusion

04/12/23

2

Passwords

Page 3: Graphical Password authentication using Hmac

Introduction

How about text-based passwords ? Difficulty of remembering passwords

easy to remember -> easy to guess hard to guess -> hard to remember

Users tend to write passwords down or use the same passwords for different accounts

An alternative: Graphical Passwords Psychological studies: Human can remember pictures

better than text

04/12/23

3

Passwords

Page 4: Graphical Password authentication using Hmac

Graphical Password Scheme

If the number of possible pictures is sufficiently large, the possible password space may exceed that of text-based schemes, thus offer better resistance to dictionary attacks.

can be used to: workstation web log-in application ATM machines mobile devices

04/12/23

4

Passwords

Page 5: Graphical Password authentication using Hmac

Overview of the Authentication Methods

Token based authentication

Biometric based authentication

Knowledge based authentication

04/12/23

5

Passwords

Page 6: Graphical Password authentication using Hmac

Recognition Based Techniques

Dhamija and Perrig SchemePick several pictures out of many choices, identify them laterin authentication.

04/12/23

6

Passwords

Page 7: Graphical Password authentication using Hmac

Recall Based Techniques

Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by

user) among many other objects, user click inside the convex hull bounded by pass-objects.

04/12/23

7

Passwords

Page 8: Graphical Password authentication using Hmac

Recognition Based Techniques

Other Schemes

Using human faces as password

Select a sequence of images as password

04/12/23

8

Passwords

Page 9: Graphical Password authentication using Hmac

Recall Based Techniques

Draw-A-Secret (DAS) SchemeUser draws a simple picture on a 2D grid, the coordinates of

the grids occupied by the picture are stored in the order of drawing

04/12/23

9

Passwords

Page 10: Graphical Password authentication using Hmac

Recall Based Techniques

“PassPoint” SchemeUser click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence.

04/12/23

10

Passwords

Page 11: Graphical Password authentication using Hmac

Recall Based Techniques

Other Schemes

Grid Selection Scheme

Signature Scheme

04/12/23

11

Passwords

Page 12: Graphical Password authentication using Hmac

Schemes Not In This Paper

Using distorted images to prevent revealing of passwords

Using images with random tracks of geometric graphical shapes

04/12/23

12

Passwords

Page 13: Graphical Password authentication using Hmac

Security

Is a graphical password as secure as text-based passwords?

04/12/23

13

Passwords

Page 14: Graphical Password authentication using Hmac

Usability

Pictures are easier to remember than text strings

Password registration and log-in process take too long

Require much more storage space than text based passwords

04/12/23

14

Passwords

Page 15: Graphical Password authentication using Hmac

Conclusion

main argument for graphical passwords: people are better at memorizing graphical passwords than text-based passwords

It is more difficult to break graphical passwords using the traditional attack methods such as:burte force search, dictionary attack or spyware.

Not yet widely used, current graphical password techniques are still immature

04/12/23

15

Passwords

Page 16: Graphical Password authentication using Hmac

HMAC-OTP

04/12/23

16

Passwords

Page 17: Graphical Password authentication using Hmac

What is 2FA

AuthenticationServer

Provisioning

Retrieval

Validation-1

Transport

(OTP-Token,(OTP-Validation Service)

349382

Validation-2

04/12/23

17

Passwords

Page 18: Graphical Password authentication using Hmac

Trend

HOTP value(1997

)

Trunc(HOT

P value)(2005

)

Different way of

entering (2012)

04/12/23

18

Passwords

Page 19: Graphical Password authentication using Hmac

Definition

HOTP- HMAC based one time password algorithmDefinition: Let k-secrete key c-counter HMAC(K,C) = SHA1(K ⊕ 0x5c5c… ∥ SHA1(K ⊕

0x3636… )) Then HOTP(K,C) is mathematically defined by HOTP(K,C) = Truncate(HMAC(K,C)) &

0x7FFFFFFF

04/12/23

19

Passwords

Page 20: Graphical Password authentication using Hmac

HOTP Value

HOTP-Value = HOTP(K,C)

mod 10d, where d is the desired number of digits

04/12/23

20

Passwords

Page 21: Graphical Password authentication using Hmac

Notation & Symbols

s: string

|s|:length of the string

n:number

|n|:length of the number

04/12/23

21

Passwords

Page 22: Graphical Password authentication using Hmac

Contd..

s[i]:string at ith bit

stToNum: function that as i/p a string s returns the number whose binary representation is s

Example: stToNum(110)=6

04/12/23

22

Passwords

Page 23: Graphical Password authentication using Hmac

Symbols

C:Counter value, moving factor

K:screate key b/w client and server

S:Synchronization parameter

Digit:number of digit in an HOTP Value

04/12/23

23

Passwords

Page 24: Graphical Password authentication using Hmac

Generation of HOTP Value

Step-1 Generate HMAC Value(HMAC-SHA-1) Let HS=HMAC-SHA-1(k,c) [ HS=20 bytes (say)]Step-2 Generate 4byte string(DT) sbits=DT(HS) [returns 32-bit

string]Step-3 Compute HOTP Value Let Snum=stToNum(sbits) return D=Snum mod 10^Digit

04/12/23

24

Passwords

Page 25: Graphical Password authentication using Hmac

Why DT?

The purpose of DT is to extract a 4 byte dynamic binary code from 160 bit(20byte)

04/12/23

25

Passwords

Page 26: Graphical Password authentication using Hmac

Cryptographic Hash function

Hello

Hai Dear

How are you

CHF

CHF

CHF

DX006YT YGC4

HG902E5E UR84

TYUR FGBV DB

BLOCKS DIGEST

04/12/23

26

Passwords

Page 27: Graphical Password authentication using Hmac

Definition

HMAC (K,m) = H((K ⊕ opad) ∥ H((K ⊕ ipad) ∥ m))where

H is a cryptographic hash function, ||: concatenation

⊕ : exclusive or (XOR)

opad is the outer padding (0x5c5c5c…5c5c) ipad is the inner padding (0x363636…3636).

04/12/23

27

Passwords

Page 28: Graphical Password authentication using Hmac

Implementation

function hmac (key, message) { if (length(key) > blocksize) then key = hash(key) end if if (length(key) < blocksize) then key = key ∥ [0x00 * (blocksize - length(key)) end if o_key_pad = [0x5c * blocksize] ⊕ key i_key_pad = [0x36 * blocksize] ⊕ key return hash(o_key_pad ∥ hash(i_key_pad ∥ message))End of function

04/12/23

28

Passwords

Page 29: Graphical Password authentication using Hmac

THANK YOU

04/12/23

29

Passwords