home *** CD-ROM | disk | FTP | other *** search
- Computer Systems Laboratory Bulletin
- November 1991
-
- ADVANCED AUTHENTICATION TECHNOLOGY
-
- Introduction
- Computer systems and the information they store and process are
- valuable resources which need to be protected. With the current
- trend toward networking, compromise of one computer on a network
- can often affect a significant number of other machines connected
- to the network.
-
- The first step toward securing a computer system is the ability
- to verify the identity of users. The process of verifying a
- user's identity is typically referred to as user authentication.
- Passwords are the method used most often for authenticating
- computer users, but this approach has often proven
- inadequate in preventing unauthorized access to computer
- resources when used as the sole means of authentication. This
- bulletin describes advanced authentication technology which can
- be used to increase the security of computer systems and
- provides guidance in the selection and use of this technology.
-
- User Authentication
- Authentication technology provides the basis for access control
- in computer systems. If the identity of a user can be correctly
- verified, legitimate users can be granted access to system
- resources. Conversely, those attempting to gain access without
- proper authorization can be denied. As used in this bulletin,
- authentication is defined as the act of verifying the identity of
- a user. Once a user's identity is verified, access control
- techniques may be used to mediate the user's access to data. A
- variety of methods are available for performing user
- authentication.
-
- The traditional method for authenticating users has been to
- provide them with a secret password, which they must use when
- requesting access to a particular system. Password systems can
- be effective if managed properly (Federal Information Processing
- Standard [FIPS] 112), but they seldom are. Authentication which
- relies solely on passwords has often failed to provide adequate
- protection for computer systems for a number of reasons. If
- users are allowed to make up their own passwords, they tend to
- choose ones that are easy to remember and therefore easy to
- guess. If passwords are generated from a random combination of
- characters, users often write them down because they are
- difficult to remember.
-
- Where password-only authentication is not adequate for an
- application, a number of alternative methods can be used alone or
- in combination to increase the security of the authentication
- process. The three generally accepted methods for verifying the
- identity of a user are based on something the user knows, such as
- a password; something the user possesses, such as an
- authentication token; and some physical characteristic of the
- user, such as a fingerprint or voice pattern.
-
- Token-Based Authentication
- Token-based authentication schemes require the system user to
- produce a physical token which the system can recognize as
- belonging to a legitimate user. These tokens typically contain
- information which is physically, magnetically, or electrically
- coded in a form which can be recognized by a host system. The
- automatic teller machines used by the retail banking industry,
- which require the user to carry a magnetic stripe card, are one
- example of token-based authentication systems. The most
- sophisticated tokens contain one or more integrated circuits
- which can store and, in some cases, process information.
- Tokens which are manufactured in the form of a credit card with
- an onboard microprocessor and memory are commonly referred to as
- "smart" cards.
-
- Token-based systems reduce the threat from attackers who attempt
- to guess or steal passwords, because the attacker must either
- fabricate a counterfeit token or steal a valid token from a user
- in addition to knowing the user's password.
-
- Biometric Authentication
- Biometric authentication relies on a unique physical
- characteristic to verify the identity of system users. Common
- biometric identifiers include fingerprints, written signatures,
- voice patterns, typing patterns, retinal scans, and hand
- geometry. The unique pattern which identifies a user is formed
- during an enrollment process, producing a template for that user.
-
- When a user wishes to authenticate to the system, a physical
- measurement is made to obtain a current biometric pattern for the
- user. This pattern can then be compared against the enrollment
- template in order to verify the user's identity. Biometric
- authentication devices tend to cost more than password or token-
- based systems, because the hardware required to capture and
- analyze biometric patterns is more complicated. However,
- biometrics provide a very high level of security because the
- authentication is directly related to a unique physical
- characteristic of the user which is more difficult to
- counterfeit. Recent technological advances have also helped to
- reduce the cost of biometric authentication systems.
-
- Combination Methods
- Passwords, authentication tokens, and biometrics are subject to a
- variety of attacks. Passwords can be guessed, tokens can be
- stolen, and even biometrics are susceptible to certain attacks.
- These threats can be reduced by applying sound design principles
- and system management techniques during the development and
- operation of an authentication system.
-
- One method which can substantially increase the security of an
- authentication system is to use a combination of authentication
- techniques. For example, an authentication system might require
- users to present an authentication token and also enter a
- password. By stealing a user's token, an attacker would still be
- unable to gain access to the host system, because the system
- would require the user's password in addition to the token.
-
- Implementation Guidelines and Recommendations
- An organization must answer numerous questions when it decides to
- implement an advanced authentication system. The following
- guidelines will assist those responsible for evaluating,
- procuring, and integrating these systems.
-
- Risk Analysis - A thorough analysis should be done to
- determine what parts of the system in question are vulnerable to
- attack, and to prioritize these vulnerabilities in terms of
- severity and likelihood.
-
- Product Evaluation and Selection - Once the risks associated with
- a host system have been identified, this information can be used
- to select an authentication system which provides adequate
- protection against these risks. In addition, the authentication
- system will have to meet several other requirements in order to
- function effectively in a given environment. The organization
- responsible for selecting the authentication system should decide
- whether sufficient in-house expertise exists to evaluate the
- available options. In some cases, it is more cost-effective to
- hire a consultant who is familiar with the available technology.
-
- Whether the evaluation is done in-house or by a consultant, the
- following items should be considered:
-
- o Sources of information - A variety of sources should be used
- when evaluating authentication systems. Vendor product
- literature can be very helpful in describing specific
- details of product operation, and in understanding the range
- of products offered. There are several annual conferences
- devoted to computer security, network access control, and
- authentication technology. In addition to the papers
- presented at these conferences, there are usually large
- vendor exhibit halls and product forums. Many
- organizations, particularly those in the government sector,
- have published information on the selection and integration
- of advanced authentication technology. These publications
- are often the result of practical experience gained during
- the implementation of these systems, and so can be
- particularly useful.
-
- o Integration into existing environment - This factor is
- discussed further in the next section, but is an important
- consideration when selecting a product. All other features
- of an authentication system may be irrelevant if the product
- cannot be integrated into the customer's computing
- environment.
-
- o Custom design - Sometimes an organization's needs cannot be
- met by a commercially available product. In these cases,
- the organization may decide to do a custom design using
- in-house resources. This alternative is most practical for
- large organizations with experienced system design and
- support groups, or for smaller organizations with a high
- level of expertise in computer access control systems.
- Vendors are often willing to work with customers to modify
- existing products or design new products to meet custom
- requirements. An arrangement which often works well is for
- the customer and vendor to work together on the design of
- the system, and for the vendor to then manufacture the
- product.
-
- o Cost and performance - The relationship between cost and
- performance can be relatively complex for authentication
- technology. Similar products from different vendors may
- vary widely in cost, depending on the vendor's manufacturing
- and development techniques and marketing philosophies. In
- general, devices with a higher performance level will cost
- more, but individual cases should be evaluated carefully.
- The general approach should be to procure the authentication
- system which provides the required level of security and
- other performance factors at a minimum cost.
-
- o Accuracy - The accuracy of an authentication system refers
- to the ability of that system to correctly identify
- authorized system users while rejecting unauthorized users.
- Since this is the primary function of an authentication
- system, accuracy is directly related to the level of
- security provided by the system. Vendors may not be
- objective about producing and interpreting the results of
- tests which quantify the accuracy of the authentication
- process with regard to the vendor's particular products.
- For these reasons, an organization may wish to run
- independent tests to determine the accuracy of an
- authentication system in terms which are relevant to the
- environment in which the system will be used.
-
- o Reliability - An authentication system should be capable of
- operating in its intended environment for a reasonable
- period of time. During this time, the system is expected to
- perform at or above a level which ensures an appropriate
- amount of protection for the host system. If the
- authentication system fails, the chances for unauthorized
- access during the failure should be minimized.
-
- o Maintainability - All hardware and software systems require
- some form of maintenance. The components of an
- authentication system should be evaluated to determine the
- level of maintenance which the system will require. One
- goal in the design of an authentication system should be to
- minimize the maintenance requirements within the constraints
- of system cost, performance, and available technology.
-
- o Commercial availability - Large-scale networking of computer
- systems and distributed computing are relatively recent
- developments, and are the driving forces behind the need for
- more effective methods for authenticating system users.
- Unfortunately, the market for advanced authentication
- technology is not fully developed and is somewhat unstable.
- Many commercially available authentication systems have not
- yet been sold in quantity. An organization that is
- considering the use of this technology should evaluate the
- vendor's ability to produce systems that meet specific
- quality control standards and in sufficient quantity to meet
- the user's requirements. Contracts written to procure
- authentication systems should provide some form of
- protection for the customer in the event that the vendor is
- unable to produce systems in the quantities required.
-
- o Upgradeability - Because the technology of advanced
- authentication systems is continually developing, any
- authentication system should be able to accommodate the
- replacement of outdated components with new ones. A modular
- approach to the design of an authentication system, with
- clearly defined interfaces between the system components,
- facilitates the process of upgrading to new technology.
-
- o Interoperability - A wide variety of computing platforms and
- security architectures are in use today. Any authentication
- system should be designed to work with as many of these
- diverse platforms as possible, or at least to require a
- minimum of modifications to work in different environments.
-
- o Reputation of manufacturer - Obtaining satisfactory service
- during the selection, installation, and long-term operation
- of an authentication system can be difficult if the
- manufacturer is uncooperative. Customers can request a list
- of references from prospective vendors for products and
- services which have been provided to other customers in the
- past. In addition, the resumes of key individuals working
- on the vendor's staff can sometimes be examined to determine
- whether an adequate level of expertise is available.
-
- o Training programs - Some form of training is usually
- necessary for the people who will be using and maintaining
- an authentication system. An effective training program is
- of critical importance to the success of any new system.
- Vendors should offer training appropriate for everyday users
- of the system, and also for the system administrators who
- will be responsible for managing the system.
-
- System Integration - The integration of an authentication
- system into an existing computer environment can be very
- difficult. Most operating systems do not contain well-defined
- entry points for replacing the default authentication mechanism
- supplied with the operating system. This is partly because there
- is no widely accepted standard for the interface between an
- operating system and an authentication device. Until such a
- standard becomes available, there are three general options:
-
- o In some cases, the vendor who provides the authentication
- system may have already integrated it into certain operating
- systems. If the authentication system meets the
- requirements of the customer and the customer is using the
- specified operating system, then the system integration has
- already been accomplished.
-
- o Operating system vendors may select certain security
- architectures for incorporation into their systems. If
- these architectures include an authentication technology
- which the customer finds acceptable, then the operating
- system may be purchased with the appropriate authentication
- mechanism as part of the package.
-
- o It may be necessary to customize the authentication system
- and perhaps modify the host operating system so that the two
- can communicate. This will involve cooperation between the
- operating system vendor, the authentication system vendor,
- and the customer, unless the customer has sufficient
- expertise to perform the integration in-house. A
- prototyping approach is strongly recommended, due to the
- complexity of this type of project. Implementing such a
- system on a small scale first can be very helpful in
- determining what problems will be encountered in a
- full-scale implementation.
-
- System Maintenance - After an authentication system has
- been selected and installed, it must be maintained. Maintenance
- costs can easily exceed the initial acquisition cost if the
- system is to be in operation for a reasonable length of time. It
- is therefore important that long-term plans for system
- maintenance be developed by the customer or provided by the
- vendor in the initial stages of the procurement cycle.
- Provisions must be made for assigning responsibilities for system
- administration so that new users can be enrolled, inactive
- accounts deleted, and system malfunctions identified and
- corrected.
-
- The majority of network authentication systems employ some form
- of cryptography, which means that some form of cryptographic key
- management system will be necessary. The key management
- component may be provided by the authentication system vendor,
- but the process of maintaining and distributing keys usually
- requires active participation by the host system. Since the
- security of a cryptographic system is directly related to the
- level of protection provided for the cryptographic keys, it is
- essential for the vendor or customer to develop a system for
- managing these keys effectively. Also, the host computer system
- will probably evolve over time through the addition of new
- software and hardware, and these changes may require
- corresponding modifications or upgrades to the authentication
- system to maintain compatibility.
-
- Summary
- Password-based authentication is the most widely used method for
- verifying the identity of persons requesting access to computer
- resources. However, authentication based only on passwords often
- does not provide adequate protection. The use of authentication
- tokens, biometrics, and other alternative methods for verifying
- the identity of system users can substantially increase the
- security of an authentication system. The proliferation of
- networked computer systems and the corresponding increase in the
- potential for security violations makes it even more critical
- those who design and operate computer systems to understand and
- implement effective authentication schemes.
-
- References
-
- Guideline on User Authentication Techniques for Computer
- Network Access Control, National Institute of Standards and
- Technology (U.S.), Federal Information Processing Standards
- Publication 83, National Technical Information Service,
- Springfield, VA, September 1980.
-
- Computer Data Authentication, National Institute of Standards
- and Technology (U.S.), Federal Information Processing
- Standards Publication 113, National Technical Information
- Service, Springfield, VA, May 1985.
-
- Biometric Access Control Device Evaluation Criteria (Draft
- Report), DCI Intelligence Information Handling Committee,
- Access Control Subcommittee, Community Headquarters Building,
- Washington, DC 20505, February 1991.
-
- Smart Card Technology: New Methods for Computer Access
- Control, National Institute of Standards and Technology
- (U.S.), NIST Special Publication 500-157, September 1988.
-
- Financial Institution Sign-On Authentication for Wholesale
- Financial Transactions, American National Standard X9.26,
- American National Standards Committee X9, American Bankers
- Association, May 1990.
-
- Password Usage, National Institute of Standards and
- Technology (U.S.), Federal Information Processing Standards
- Publication 112, National Technical Information Service,
- Springfield, VA, May 1985.
-
- For More Information
- For further information on NIST's ongoing work in advanced
- authentication technology, contact Jim Dray, Computer Security
- Division, Room A216, Technology Building, National Institute of
- Standards and Technology, Gaithersburg, MD 20899, (301) 975-
- 3356.
- Downloaded From P-80 International Information Systems 304-744-2253
-