Skip to main content
Authentication Methods
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/
  6. Cyber Security Slidev Presentations/

Authentication Methods

·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Authentication Methods
#

Unit II: Account & Data Security
#

Lecture 9: Verifying Identity in Digital Systems
#

Course: Cyber Security (4353204) | Semester V | Diploma ICT | Author: Milav Dabgar

layout: default
#

What is Authentication?
#

๐Ÿ” Definition
#

Authentication is the process of verifying the identity of a user, device, or system to ensure they are who they claim to be before granting access to resources.

๐ŸŽฏ Authentication vs Authorization
#

  • Authentication - “Who are you?”
  • Authorization - “What can you do?”
  • Accounting - “What did you do?”

๐Ÿ“Š Authentication Factors
#

graph TB
    A[Authentication Factors] --> B[Something you KNOW]
    A --> C[Something you HAVE]
    A --> D[Something you ARE]
    A --> E[Somewhere you ARE]
    A --> F[Something you DO]
    
    B --> B1[Passwords, PINs]
    C --> C1[Cards, Tokens]
    D --> D1[Biometrics]
    E --> E1[Location]
    F --> F1[Behavior]

๐Ÿ”‘ Types of Authentication
#

1๏ธโƒฃ Single-Factor Authentication (SFA)
#

  • One authentication factor only
  • Most common - password only
  • Weakest security level
  • Easy to implement

2๏ธโƒฃ Two-Factor Authentication (2FA)
#

  • Two different authentication factors
  • Significantly stronger than SFA
  • Common combinations:
    • Password + SMS code
    • Password + hardware token
    • Password + biometric

๐Ÿ”ข Multi-Factor Authentication (MFA)
#

  • Three or more authentication factors
  • Highest security level
  • Complex implementation
  • Enterprise environments
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Password-Based Authentication
#

๐Ÿ”ค Password Security
#

โœ… Strong Password Characteristics
#

  • Length: 12+ characters minimum
  • Complexity: Upper, lower, numbers, symbols
  • Uniqueness: Different for each account
  • Unpredictability: No personal information
  • Regular updates: Change periodically

๐Ÿ“Š Password Strength Examples
#

Weak:     password123        (11 chars)
Better:   P@ssw0rd2024!      (13 chars)
Strong:   Tr0ub4dor&3        (11 chars)
Stronger: correct-horse-battery-staple (28 chars)

๐Ÿ›ก๏ธ Password Storage Best Practices
#

import bcrypt
import hashlib

# Secure password hashing with bcrypt
def hash_password(password):
    salt = bcrypt.gensalt(rounds=12)
    return bcrypt.hashpw(password.encode(), salt)

def verify_password(password, hashed):
    return bcrypt.checkpw(password.encode(), hashed)

โš ๏ธ Password Vulnerabilities
#

๐ŸŽญ Common Attack Methods
#

  • Brute force - Try all combinations
  • Dictionary attacks - Common passwords
  • Credential stuffing - Reused passwords
  • Rainbow tables - Pre-computed hashes
  • Social engineering - Trick users
  • Keyloggers - Capture keystrokes

๐Ÿ“ˆ Password Attack Statistics
#

  • 81% of breaches involve weak/stolen passwords
  • Average user has 100+ accounts
  • 65% of users reuse passwords
  • Top 25 passwords account for 10% of all passwords

๐Ÿ”’ Password Protection Measures
#

  • Password managers (LastPass, 1Password)
  • Regular updates and rotation
  • Account lockout policies
  • CAPTCHA implementation
  • Monitoring for breaches
  • User education and training
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Biometric Authentication
#

๐Ÿ‘ค Biometric Types
#

๐Ÿ” Physiological Biometrics
#

  • Fingerprints - Ridge patterns
  • Iris scanning - Eye patterns
  • Retinal scanning - Blood vessel patterns
  • Facial recognition - Facial features
  • Hand geometry - Hand measurements
  • DNA analysis - Genetic markers

๐ŸŽญ Behavioral Biometrics
#

  • Voice recognition - Speech patterns
  • Signature dynamics - Writing patterns
  • Keystroke dynamics - Typing rhythm
  • Gait analysis - Walking patterns
  • Mouse dynamics - Movement patterns

๐Ÿ“Š Biometric Accuracy Metrics
#

  • False Acceptance Rate (FAR) - Wrong person accepted
  • False Rejection Rate (FRR) - Right person rejected
  • Equal Error Rate (EER) - FAR = FRR point
  • Failure to Enroll (FTE) - Cannot capture template

๐Ÿ›ก๏ธ Biometric Implementation
#

โœ… Advantages
#

  • Cannot be forgotten or lost
  • Difficult to forge or steal
  • Unique to individual
  • Always available
  • Non-transferable

โŒ Disadvantages
#

  • Privacy concerns - permanent data
  • Expensive implementation
  • False positives/negatives
  • Cannot be changed if compromised
  • Cultural/religious objections
  • Physical changes over time

๐Ÿ”ง Implementation Considerations
#

# Biometric template storage (conceptual)
class BiometricTemplate:
    def __init__(self, user_id, biometric_type):
        self.user_id = user_id
        self.type = biometric_type
        self.template = self.extract_features()
        self.quality_score = self.assess_quality()
        
    def authenticate(self, live_sample):
        similarity = self.match(live_sample)
        return similarity > self.threshold
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Token-Based Authentication
#

๐ŸŽซ Hardware Tokens
#

๐Ÿ”‘ Types of Hardware Tokens
#

  • Hardware Security Keys (YubiKey, Titan)
  • Smart Cards with embedded chips
  • USB tokens with cryptographic functions
  • RFID/NFC cards for proximity access
  • Time-based tokens (RSA SecurID)

๐Ÿ“ฑ Software Tokens
#

  • Mobile authenticator apps (Google, Microsoft)
  • SMS-based codes (less secure)
  • Email-based tokens
  • Push notifications for approval

๐Ÿ”„ Token Authentication Process
#

sequenceDiagram
    participant U as User
    participant T as Token
    participant S as Server
    
    U->>S: Username + Password
    S->>U: Request token code
    U->>T: Generate code
    T->>U: Display code
    U->>S: Enter code
    S->>S: Verify code
    S->>U: Access granted

๐Ÿ›ก๏ธ Token Security Features
#

๐Ÿ”’ TOTP (Time-Based One-Time Password)
#

import hmac
import hashlib
import time
import base64

def generate_totp(secret, time_step=30):
    # Get current time step
    current_time = int(time.time() // time_step)
    
    # Convert to bytes
    time_bytes = current_time.to_bytes(8, 'big')
    
    # Generate HMAC
    secret_bytes = base64.b32decode(secret)
    digest = hmac.new(secret_bytes, time_bytes, hashlib.sha1).digest()
    
    # Extract 6-digit code
    offset = digest[-1] & 0x0f
    code = ((digest[offset] & 0x7f) << 24 |
            (digest[offset + 1] & 0xff) << 16 |
            (digest[offset + 2] & 0xff) << 8 |
            (digest[offset + 3] & 0xff))
    
    return f"{code % 1000000:06d}"

๐ŸŽฏ Token Advantages
#

  • Time-synchronized or event-based
  • Offline generation possible
  • Difficult to intercept
  • No network dependency
  • Standardized protocols (OATH)
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Certificate-Based Authentication
#

๐Ÿ“œ Digital Certificates
#

๐Ÿ” Public Key Infrastructure (PKI)
#

  • Certificate Authority (CA) issues certificates
  • Registration Authority (RA) verifies identities
  • Certificate Repository stores public certificates
  • Certificate Revocation List (CRL) tracks invalid certs

๐Ÿ“Š Certificate Structure (X.509)
#

Certificate:
  Version: 3
  Serial Number: 12345678
  Signature Algorithm: SHA-256 with RSA
  Issuer: CN=Example CA, O=Example Org
  Validity:
    Not Before: Jan 1, 2024
    Not After: Dec 31, 2025
  Subject: CN=John Doe, O=Example Corp
  Public Key: RSA 2048-bit
  Extensions:
    Key Usage: Digital Signature, Key Encipherment
    Subject Alt Name: john.doe@example.com

๐Ÿ”„ Certificate Authentication Process
#

  1. Client presents certificate
  2. Server validates certificate chain
  3. Server checks CRL/OCSP status
  4. Client proves private key ownership
  5. Authentication successful

๐Ÿ›ก๏ธ Certificate Management
#

๐Ÿ“‹ Certificate Lifecycle
#

graph LR
    A[Request] --> B[Validation]
    B --> C[Issuance]
    C --> D[Deployment]
    D --> E[Monitoring]
    E --> F[Renewal/Revocation]
    F --> G[Archive]
    
    style C fill:#e8f5e8
    style E fill:#fff3e0
    style F fill:#f3e5f5

๐Ÿ”ง Implementation Example
#

from cryptography import x509
from cryptography.hazmat.primitives import hashes

def validate_certificate(cert_data):
    try:
        # Parse certificate
        cert = x509.load_pem_x509_certificate(cert_data)
        
        # Check validity period
        now = datetime.utcnow()
        if now < cert.not_valid_before or now > cert.not_valid_after:
            return False, "Certificate expired"
        
        # Verify signature (simplified)
        # In practice, verify against CA certificate
        return True, "Certificate valid"
        
    except Exception as e:
        return False, f"Certificate invalid: {e}"

๐ŸŽฏ Certificate Advantages
#

  • Strong cryptographic foundation
  • Non-repudiation support
  • Scalable for large organizations
  • Standards-based (X.509, PKCS)
  • Revocation mechanisms available
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Single Sign-On (SSO) Systems
#

๐Ÿ”‘ SSO Overview
#

๐ŸŽฏ What is SSO?
#

Single Sign-On allows users to authenticate once and gain access to multiple systems without re-entering credentials.

โœ… SSO Benefits
#

  • User convenience - One login for all systems
  • Reduced password fatigue
  • Centralized user management
  • Improved security - Fewer passwords to manage
  • Cost reduction - Lower help desk calls

๐Ÿ“Š SSO Protocols
#

  • SAML (Security Assertion Markup Language)
  • OAuth 2.0 - Authorization framework
  • OpenID Connect - Identity layer on OAuth 2.0
  • Kerberos - Network authentication protocol
  • LDAP/Active Directory integration

๐Ÿ”„ SAML Authentication Flow
#

sequenceDiagram
    participant U as User
    participant SP as Service Provider
    participant IdP as Identity Provider
    
    U->>SP: Access request
    SP->>U: Redirect to IdP
    U->>IdP: Authenticate
    IdP->>U: SAML assertion
    U->>SP: Submit assertion
    SP->>SP: Validate assertion
    SP->>U: Grant access

๐Ÿ›ก๏ธ SSO Security Considerations
#

  • Single point of failure - IdP compromise affects all systems
  • Session management complexity
  • Token security and lifetime
  • Cross-domain security policies
  • Logout synchronization challenges

๐Ÿ”ง SSO Implementation
#

<!-- SAML Assertion Example -->
<saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
  <saml:Issuer>https://idp.example.com</saml:Issuer>
  <saml:Subject>
    <saml:NameID>john.doe@example.com</saml:NameID>
  </saml:Subject>
  <saml:AuthnStatement>
    <saml:AuthnContext>
      <saml:AuthnContextClassRef>
        urn:oasis:names:tc:SAML:2.0:ac:classes:Password
      </saml:AuthnContextClassRef>
    </saml:AuthnContext>
  </saml:AuthnStatement>
</saml:Assertion>
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Modern Authentication Trends#

๐Ÿš€ Emerging Technologies
#

๐Ÿ” Passwordless Authentication
#

  • FIDO2/WebAuthn standards
  • Windows Hello biometric login
  • Apple Touch/Face ID integration
  • Hardware security keys only
  • Magic links via email

๐Ÿค– Adaptive Authentication
#

  • Risk-based authentication
  • Behavioral analysis
  • Device fingerprinting
  • Geolocation factors
  • Machine learning algorithms

โ˜๏ธ Cloud Authentication
#

  • Azure Active Directory
  • AWS Identity Center
  • Google Cloud Identity
  • Identity as a Service (IDaaS)
  • Zero Trust architecture

๐Ÿ“ฑ Mobile Authentication
#

๐Ÿ“ฒ Mobile-Specific Methods
#

  • Push notifications for approval
  • QR code authentication
  • Mobile biometrics (fingerprint, face)
  • SIM-based authentication
  • App-to-app authentication

๐Ÿ”’ Mobile Security Challenges
#

  • Device theft/loss
  • Malware on devices
  • Network interception
  • App vulnerabilities
  • Jailbreaking/rooting risks

๐Ÿ›ก๏ธ Best Practices
#

Mobile Auth Security:
  - Device encryption mandatory
  - App certificate pinning
  - Root/jailbreak detection
  - Secure element usage
  - Regular security updates
  - Remote wipe capability
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: default
#

Practical Exercise: Authentication Design
#

๐ŸŽฏ Group Activity (20 minutes)
#

Scenario: Enterprise Authentication System
#

Your company needs to design an authentication system for:

  • 5,000 employees across multiple locations
  • Mix of office workers and remote workers
  • Various devices: Windows, Mac, mobile phones, tablets
  • Multiple applications: Email, CRM, HR system, file servers
  • Compliance requirements: SOX, HIPAA
  • Budget constraints: $50 per user annually

Task: Design Comprehensive Authentication Solution
#

Address these requirements:

  1. Authentication Methods:

    • What authentication factors would you implement?
    • How would you handle different user types?
    • What about temporary/contractor access?
  2. Technology Selection:

    • Which authentication protocols would you use?
    • How would you implement SSO?
    • What about mobile device authentication?
  3. Security Policies:

    • Password policy requirements
    • Multi-factor authentication rules
    • Session management policies
    • Account lockout procedures
  4. Implementation Plan:

    • Phased rollout strategy
    • User training approach
    • Help desk preparation
    • Monitoring and maintenance

Deliverables:

  • Authentication architecture diagram
  • Technology selection justification
  • Security policy framework
  • Implementation timeline and costs
Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: center class: text-center
#

Questions & Discussion
#

๐Ÿค” Discussion Points:
#

  • Which authentication method provides the best balance of security and usability?
  • How do you handle authentication for different user risk levels?
  • What are the challenges of implementing passwordless authentication?

๐Ÿ’ก Exercise Review
#

Share your enterprise authentication system designs

Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar

layout: center class: text-center
#

Thank You!
#

Next Lecture: Authorization and Access Control
#

Determining What Users Can Do
#

Cyber Security (4353204) - Lecture 9 Complete

Authentication: Proving you are who you say you are! ๐Ÿ”๐Ÿ‘ค

Course: Cyber Security (4353204) | Unit II | Lecture 9 | Author: Milav Dabgar