Computer Systems Laboratory Bulletin November 1991 ADVANCED AUTHENTICATION TECHNOLOGY Introduction Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking, compromise of one computer on a network can often affect a significant number of other machines connected to the network. The first step toward securing a computer system is the ability to verify the identity of users. The process of verifying a user's identity is typically referred to as user authentication. Passwords are the method used most often for authenticating computer users, but this approach has often proven inadequate in preventing unauthorized access to computer resources when used as the sole means of authentication. This bulletin describes advanced authentication technology which can be used to increase the security of computer systems and provides guidance in the selection and use of this technology. User Authentication Authentication technology provides the basis for access control in computer systems. If the identity of a user can be correctly verified, legitimate users can be granted access to system resources. Conversely, those attempting to gain access without proper authorization can be denied. As used in this bulletin, authentication is defined as the act of verifying the identity of a user. Once a user's identity is verified, access control techniques may be used to mediate the user's access to data. A variety of methods are available for performing user authentication. The traditional method for authenticating users has been to provide them with a secret password, which they must use when requesting access to a particular system. Password systems can be effective if managed properly (Federal Information Processing Standard [FIPS] 112), but they seldom are. Authentication which relies solely on passwords has often failed to provide adequate protection for computer systems for a number of reasons. If users are allowed to make up their own passwords, they tend to choose ones that are easy to remember and therefore easy to guess. If passwords are generated from a random combination of characters, users often write them down because they are difficult to remember. Where password-only authentication is not adequate for an application, a number of alternative methods can be used alone or in combination to increase the security of the authentication process. The three generally accepted methods for verifying the identity of a user are based on something the user knows, such as a password; something the user possesses, such as an authentication token; and some physical characteristic of the user, such as a fingerprint or voice pattern. Token-Based Authentication Token-based authentication schemes require the system user to produce a physical token which the system can recognize as belonging to a legitimate user. These tokens typically contain information which is physically, magnetically, or electrically coded in a form which can be recognized by a host system. The automatic teller machines used by the retail banking industry, which require the user to carry a magnetic stripe card, are one example of token-based authentication systems. The most sophisticated tokens contain one or more integrated circuits which can store and, in some cases, process information. Tokens which are manufactured in the form of a credit card with an onboard microprocessor and memory are commonly referred to as "smart" cards. Token-based systems reduce the threat from attackers who attempt to guess or steal passwords, because the attacker must either fabricate a counterfeit token or steal a valid token from a user in addition to knowing the user's password. Biometric Authentication Biometric authentication relies on a unique physical characteristic to verify the identity of system users. Common biometric identifiers include fingerprints, written signatures, voice patterns, typing patterns, retinal scans, and hand geometry. The unique pattern which identifies a user is formed during an enrollment process, producing a template for that user. When a user wishes to authenticate to the system, a physical measurement is made to obtain a current biometric pattern for the user. This pattern can then be compared against the enrollment template in order to verify the user's identity. Biometric authentication devices tend to cost more than password or token- based systems, because the hardware required to capture and analyze biometric patterns is more complicated. However, biometrics provide a very high level of security because the authentication is directly related to a unique physical characteristic of the user which is more difficult to counterfeit. Recent technological advances have also helped to reduce the cost of biometric authentication systems. Combination Methods Passwords, authentication tokens, and biometrics are subject to a variety of attacks. Passwords can be guessed, tokens can be stolen, and even biometrics are susceptible to certain attacks. These threats can be reduced by applying sound design principles and system management techniques during the development and operation of an authentication system. One method which can substantially increase the security of an authentication system is to use a combination of authentication techniques. For example, an authentication system might require users to present an authentication token and also enter a password. By stealing a user's token, an attacker would still be unable to gain access to the host system, because the system would require the user's password in addition to the token. Implementation Guidelines and Recommendations An organization must answer numerous questions when it decides to implement an advanced authentication system. The following guidelines will assist those responsible for evaluating, procuring, and integrating these systems. Risk Analysis - A thorough analysis should be done to determine what parts of the system in question are vulnerable to attack, and to prioritize these vulnerabilities in terms of severity and likelihood. Product Evaluation and Selection - Once the risks associated with a host system have been identified, this information can be used to select an authentication system which provides adequate protection against these risks. In addition, the authentication system will have to meet several other requirements in order to function effectively in a given environment. The organization responsible for selecting the authentication system should decide whether sufficient in-house expertise exists to evaluate the available options. In some cases, it is more cost-effective to hire a consultant who is familiar with the available technology. Whether the evaluation is done in-house or by a consultant, the following items should be considered: o Sources of information - A variety of sources should be used when evaluating authentication systems. Vendor product literature can be very helpful in describing specific details of product operation, and in understanding the range of products offered. There are several annual conferences devoted to computer security, network access control, and authentication technology. In addition to the papers presented at these conferences, there are usually large vendor exhibit halls and product forums. Many organizations, particularly those in the government sector, have published information on the selection and integration of advanced authentication technology. These publications are often the result of practical experience gained during the implementation of these systems, and so can be particularly useful. o Integration into existing environment - This factor is discussed further in the next section, but is an important consideration when selecting a product. All other features of an authentication system may be irrelevant if the product cannot be integrated into the customer's computing environment. o Custom design - Sometimes an organization's needs cannot be met by a commercially available product. In these cases, the organization may decide to do a custom design using in-house resources. This alternative is most practical for large organizations with experienced system design and support groups, or for smaller organizations with a high level of expertise in computer access control systems. Vendors are often willing to work with customers to modify existing products or design new products to meet custom requirements. An arrangement which often works well is for the customer and vendor to work together on the design of the system, and for the vendor to then manufacture the product. o Cost and performance - The relationship between cost and performance can be relatively complex for authentication technology. Similar products from different vendors may vary widely in cost, depending on the vendor's manufacturing and development techniques and marketing philosophies. In general, devices with a higher performance level will cost more, but individual cases should be evaluated carefully. The general approach should be to procure the authentication system which provides the required level of security and other performance factors at a minimum cost. o Accuracy - The accuracy of an authentication system refers to the ability of that system to correctly identify authorized system users while rejecting unauthorized users. Since this is the primary function of an authentication system, accuracy is directly related to the level of security provided by the system. Vendors may not be objective about producing and interpreting the results of tests which quantify the accuracy of the authentication process with regard to the vendor's particular products. For these reasons, an organization may wish to run independent tests to determine the accuracy of an authentication system in terms which are relevant to the environment in which the system will be used. o Reliability - An authentication system should be capable of operating in its intended environment for a reasonable period of time. During this time, the system is expected to perform at or above a level which ensures an appropriate amount of protection for the host system. If the authentication system fails, the chances for unauthorized access during the failure should be minimized. o Maintainability - All hardware and software systems require some form of maintenance. The components of an authentication system should be evaluated to determine the level of maintenance which the system will require. One goal in the design of an authentication system should be to minimize the maintenance requirements within the constraints of system cost, performance, and available technology. o Commercial availability - Large-scale networking of computer systems and distributed computing are relatively recent developments, and are the driving forces behind the need for more effective methods for authenticating system users. Unfortunately, the market for advanced authentication technology is not fully developed and is somewhat unstable. Many commercially available authentication systems have not yet been sold in quantity. An organization that is considering the use of this technology should evaluate the vendor's ability to produce systems that meet specific quality control standards and in sufficient quantity to meet the user's requirements. Contracts written to procure authentication systems should provide some form of protection for the customer in the event that the vendor is unable to produce systems in the quantities required. o Upgradeability - Because the technology of advanced authentication systems is continually developing, any authentication system should be able to accommodate the replacement of outdated components with new ones. A modular approach to the design of an authentication system, with clearly defined interfaces between the system components, facilitates the process of upgrading to new technology. o Interoperability - A wide variety of computing platforms and security architectures are in use today. Any authentication system should be designed to work with as many of these diverse platforms as possible, or at least to require a minimum of modifications to work in different environments. o Reputation of manufacturer - Obtaining satisfactory service during the selection, installation, and long-term operation of an authentication system can be difficult if the manufacturer is uncooperative. Customers can request a list of references from prospective vendors for products and services which have been provided to other customers in the past. In addition, the resumes of key individuals working on the vendor's staff can sometimes be examined to determine whether an adequate level of expertise is available. o Training programs - Some form of training is usually necessary for the people who will be using and maintaining an authentication system. An effective training program is of critical importance to the success of any new system. Vendors should offer training appropriate for everyday users of the system, and also for the system administrators who will be responsible for managing the system. System Integration - The integration of an authentication system into an existing computer environment can be very difficult. Most operating systems do not contain well-defined entry points for replacing the default authentication mechanism supplied with the operating system. This is partly because there is no widely accepted standard for the interface between an operating system and an authentication device. Until such a standard becomes available, there are three general options: o In some cases, the vendor who provides the authentication system may have already integrated it into certain operating systems. If the authentication system meets the requirements of the customer and the customer is using the specified operating system, then the system integration has already been accomplished. o Operating system vendors may select certain security architectures for incorporation into their systems. If these architectures include an authentication technology which the customer finds acceptable, then the operating system may be purchased with the appropriate authentication mechanism as part of the package. o It may be necessary to customize the authentication system and perhaps modify the host operating system so that the two can communicate. This will involve cooperation between the operating system vendor, the authentication system vendor, and the customer, unless the customer has sufficient expertise to perform the integration in-house. A prototyping approach is strongly recommended, due to the complexity of this type of project. Implementing such a system on a small scale first can be very helpful in determining what problems will be encountered in a full-scale implementation. System Maintenance - After an authentication system has been selected and installed, it must be maintained. Maintenance costs can easily exceed the initial acquisition cost if the system is to be in operation for a reasonable length of time. It is therefore important that long-term plans for system maintenance be developed by the customer or provided by the vendor in the initial stages of the procurement cycle. Provisions must be made for assigning responsibilities for system administration so that new users can be enrolled, inactive accounts deleted, and system malfunctions identified and corrected. The majority of network authentication systems employ some form of cryptography, which means that some form of cryptographic key management system will be necessary. The key management component may be provided by the authentication system vendor, but the process of maintaining and distributing keys usually requires active participation by the host system. Since the security of a cryptographic system is directly related to the level of protection provided for the cryptographic keys, it is essential for the vendor or customer to develop a system for managing these keys effectively. Also, the host computer system will probably evolve over time through the addition of new software and hardware, and these changes may require corresponding modifications or upgrades to the authentication system to maintain compatibility. Summary Password-based authentication is the most widely used method for verifying the identity of persons requesting access to computer resources. However, authentication based only on passwords often does not provide adequate protection. The use of authentication tokens, biometrics, and other alternative methods for verifying the identity of system users can substantially increase the security of an authentication system. The proliferation of networked computer systems and the corresponding increase in the potential for security violations makes it even more critical those who design and operate computer systems to understand and implement effective authentication schemes. References Guideline on User Authentication Techniques for Computer Network Access Control, National Institute of Standards and Technology (U.S.), Federal Information Processing Standards Publication 83, National Technical Information Service, Springfield, VA, September 1980. Computer Data Authentication, National Institute of Standards and Technology (U.S.), Federal Information Processing Standards Publication 113, National Technical Information Service, Springfield, VA, May 1985. Biometric Access Control Device Evaluation Criteria (Draft Report), DCI Intelligence Information Handling Committee, Access Control Subcommittee, Community Headquarters Building, Washington, DC 20505, February 1991. Smart Card Technology: New Methods for Computer Access Control, National Institute of Standards and Technology (U.S.), NIST Special Publication 500-157, September 1988. Financial Institution Sign-On Authentication for Wholesale Financial Transactions, American National Standard X9.26, American National Standards Committee X9, American Bankers Association, May 1990. Password Usage, National Institute of Standards and Technology (U.S.), Federal Information Processing Standards Publication 112, National Technical Information Service, Springfield, VA, May 1985. For More Information For further information on NIST's ongoing work in advanced authentication technology, contact Jim Dray, Computer Security Division, Room A216, Technology Building, National Institute of Standards and Technology, Gaithersburg, MD 20899, (301) 975- 3356.Downloaded From P-80 International Information Systems 304-744-2253