SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Key Distribution and
UserAuthentication
Overview

  •   Symmetric Key Distribution using Symmetric Encryption
        Kerberos


  •   Key Distribution using Asymmetric Encryption
        X.509 Certificates




                                                              2




Raja Khurram Shahzad
Symmetric Key Distribution

  •   Two parties must share same key
        Protected from the access of others
        Frequent key exchange to limit amount of data
         compromised


  •   Key can be exchanged
       1.   Physical delivery to B
       2.   A third party physically deliver it to A and B
       3.   Re-usage of old key to exchange new key
       4.   A & B both communicate securely with C, C delivers the key

        For option 1 & 2 require manual delivery

        For option 3 link encryption or end-to-end encryption, What if old key
         is compromised
                                                                                  3




Raja Khurram Shahzad
Symmetric Key Distribution

        For option 4 two kinds of keys are used
             – Session Key: One time key
             – Permanent Key: for distributing session key.

             – Necessary element, Key Distribution Center (KDC):
               determines which systems are allowed to communicate with each
               other.

             – Operation of KDC
                   • A wish to communicate B, transmits request to KDC.
                     Communication is encrypted using a master key
                   • KDC approves connection and creates one time session key.
                     Session key is encrypted with permanent keys of A & B and
                     delivered to A & B.
                   • A & B set up logical connection and uses session key.


        Most widely application to use this approach is KERBEROS
                                                                                 4




Raja Khurram Shahzad
Security Concerns

  •   Key concerns are confidentiality and timeliness

  •   To provide confidentiality must encrypt identification and session
      key info which requires the use of previously shared private or
      public keys

  •   Need timeliness to prevent replay attacks

  •   Provided by using      sequence         numbers     or   timestamps   or
      challenge/response




                                                                                 5



                              ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS




             In Greek mythology, a many headed dog,
              the guardian of the entrance of Hades
                                                      6



                         ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS


    •   Users wish to access services on servers.

    •   Three threats exist:
           User pretend to be another user.
           User alter the network address of a workstation.
           User eavesdrop on exchanges and use a replay attack.




                                                                   7



                                  ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS

   •    Assumes a distributed client/server architecture

   •    Provides a centralized authentication server to authenticate
        users to servers and servers to users.

   •    Relies on conventional encryption, making no use of public-
        key encryption


   •    Two versions: version 4 and 5

   •    Version 4 makes use of DES



                                                                       8



                              ET2437 - Network Security
Raja Khurram Shahzad
Requirements for Kerberos

  •   Secure:
         Eavesdropper should not be able to obtain the necessary
          information to impersonate a user


  •   Reliable:
         Kerberos should employ a distributed server architecture, systems
          backing up each other


  •   Transparent:
         User should not be aware that authentication is taking place


  •   Scalable:
         The system should be capable of supporting large number of clients
          and servers

                                                                               9



                                  ET2437 - Network Security
Raja Khurram Shahzad
Overview of Kerberos

  •   AS = Authentication Server
  •   SS = Service Server
  •   TGS = Ticket-Granting Server
  •   TGT = Ticket Granting Ticket

  •   User Client-based Logon
        A user enters a username and password on the client machine.
        The client performs a one-way function (hash usually) on the entered
         password, and this becomes the secret key of the client/user.




                                                                                10




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Authentication
        The client sends a clear text message of the user ID to the AS
         requesting services on behalf of the user. (Note: Neither the secret
         key nor the password is sent to the AS.)
             – The AS generates the secret key by hashing the password of the
               user found at the database.



        The AS checks client rights in its database. If valid, the AS sends
         back the following two messages to the client:
             – Message A: Client/TGS Session Key encrypted using the secret key
               of the client/user.
             – Message B: Ticket-to Get-Ticket (which includes the client ID, client
               network address, ticket validity period, and the client/TGS session
               key) encrypted using the secret key of the TGS.


                                                                                       11




Raja Khurram Shahzad
Overview of Kerberos

        Client receives messages A and B, and decrypt message A to obtain
         the Client/TGS Session Key.
             – The session key is used for further communications with the TGS.
               (Note: The client cannot decrypt Message B, as it is encrypted using
               TGS's secret key.)




                                                                                      12




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Authorization
        When requesting services, the client sends the following two
         messages to the TGS:
             – Message C: Composed of the TGT from message B and the ID of the
               requested service.
             – Message D: Authenticator (which is composed of the client ID and the
               timestamp), encrypted using the Client/TGS Session Key.

        TGS retrieves message B out of message C. It decrypts message B
         using the TGS secret key to have "client/TGS session key". Using this
         key, the TGS decrypts message D (Authenticator) and sends the
         following two messages to the client:
             – Message E: Client-to-server ticket (which includes the client ID, client
               network address, validity period and Client/Server Session Key)
               encrypted using the service's secret key.
             – Message F: Client/server session key encrypted with the Client/TGS
               Session Key.
                                                                                          13




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Authorization
        For requesting services, the client sends the following two messages
         to the TGS:
             – Message C: Composed of the TGT from message B and the ID of the
               requested service.
             – Message D: Authenticator (which is composed of the client ID and
               the timestamp), encrypted using the Client/TGS Session Key.

        TGS retrieves message B out of message C.
             – It decrypts message B using the TGS secret key. This gives it the
               "client/TGS session key". Using this key, the TGS decrypts message
               D (Authenticator) and sends the following two messages to the client:
                   • Message E: Client-to-server ticket (which includes the client ID, client
                     network address, validity period and Client/Server Session Key)
                     encrypted using the service's secret key.
                   • Message F: Client/server session key encrypted with the Client/TGS
                     Session Key.
                                                                                                14




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Request
        Client receives messages E and F from TGS.
        The client connects to the SS and sends the following two messages:
             – Message E from the previous step (the client-to-server ticket,
               encrypted using service's secret key).
             – Message G: a new Authenticator, which includes the client ID,
               timestamp and is encrypted using client/server session key.
        The SS decrypts the ticket using its own secret key to retrieve
         the Client/Server Session Key. Using the sessions key, SS
         decrypts the Authenticator and sends the following message to the
         client to confirm its true identity and willingness to serve the client:
             – Message H: the timestamp found in client's Authenticator plus 1,
               encrypted using the Client/Server Session Key.
        ƒ The client decrypts the confirmation using the Client/Server
         Session Key and checks whether the timestamp is correctly updated.
         If so, then the client can trust the server and can start issuing service
         requests to the server.
                                                                                     15
        The server provides the requested services to the client.

Raja Khurram Shahzad
Overview of Kerberos




                                                       16



                           ET2437 - Network Security
Raja Khurram Shahzad
Kerberos Version 4

   •    Terms:
          C = Client
          AS = authentication server
          V = server
          IDc = identifier of user on C
          IDv = identifier of V
          Pc = password of user on C
          ADc = network address of C
          Kv = secret encryption key shared by AS and V
          TS = timestamp
          || = concatenation




                                                            17



                                ET2437 - Network Security
Raja Khurram Shahzad
A Simple Authentication Dialogue


     (1) C  AS:                          IDc || Pc || IDv
     (2) AS  C:                      Ticket
     (3) C  V:                  IDc || Ticket

     •       Ticket = EKv[IDc || Pc || IDv]




                                                             18



                                 ET2437 - Network Security
Raja Khurram Shahzad
Remaining problems


  2. Number of times that a user has to enter a password

  4. Plain-text transmission of password




                                                           19



                            ET2437 - Network Security
Raja Khurram Shahzad
More secure Authentication Dialogue
Once per user logon session:
•     C  AS:          IDC || IDtgs
•     AS  C:          EKc [ Tickettgs ]



Once per type of service:
(3) C  TGS:           IDC || IDV ||Tickettgs

(4)     TGS  C:       TicketV



Once per service session:
(5) C  V:             IDC || TicketV


                                                             20



                                 ET2437 - Network Security
Raja Khurram Shahzad
Remaining problems



  3. The lifetime associated with the ticket-granting ticket

  5. Servers are not able to authenticate themselves




                                                               21



                             ET2437 - Network Security
Raja Khurram Shahzad
Version 4 Authentication Dialogue
Authentication Service Exhange: To obtain Ticket-Granting
   Ticket
•     C  AS:           IDc || IDtgs ||TS1
•     AS  C:           EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs]

Ticket-Granting Service Echange: To obtain Service-Granting
    Ticket
(3) C  TGS:            IDv ||Tickettgs ||Authenticatorc

(4)     TGS  C:        EKc [Kc,¨v|| IDv || TS4 || Ticketv]

Client/Server Authentication Exhange: To Obtain Service
(5) C  V:             Ticketv || Authenticatorc

(6) V  C:              EKc,v[TS5 +1]

                                                                                22



                                 ET2437 - Network Security
Raja Khurram Shahzad
Version 4 Authentication Dialogue

  •    Problems:
         Lifetime associated with the ticket-granting ticket
         If to short  repeatedly asked for password
         If to long  greater opportunity to replay


  •    The threat is that an opponent will steal the ticket and use it before
       it expires




                                                                                23



                                  ET2437 - Network Security
Raja Khurram Shahzad
Overview of Kerberos




                                                       24



                           ET2437 - Network Security
Raja Khurram Shahzad
Request for Service in Another Realm




                                                       25



                           ET2437 - Network Security
Raja Khurram Shahzad
Difference Between Version 4 and 5

 •   Encryption system dependence (V.4 DES)

 •   IP - Internet protocol dependence

 •   Message byte ordering

 •   Ticket lifetime

 •   Authentication forwarding

 •   Inter realm authentication


                                                          26



                              ET2437 - Network Security
Raja Khurram Shahzad
Kerberos - in practice
  •   Currently have two Kerberos versions:
         4 : restricted to a single realm
         5 : allows inter-realm authentication, in beta test

  •   Kerberos v5 is an Internet standard
  •   Specified in RFC1510, and used by many utilities

  •   To use Kerberos:
         need to have a Key Distribution Center (KDC) on your network
         need to have Kerberised applications running on all participating
          systems
         major problem - US export restrictions
         Kerberos cannot be directly distributed outside the US in source format
          (& binary versions must obscure crypto routine entry points and have
          no encryption)
         else crypto libraries must be re-implemented locally

                                                                                    27



                                   ET2437 - Network Security
Raja Khurram Shahzad
Key Distribution using Asymmetric Encryption

  •   Problem : The distribution of Public Keys
        What if a fake user imparsionate to be a legitimate user and distribute his
         keys
  •   Solution : Public-Key Certificates
        Consists of a public key + User ID of the key owner with whole block
         signed by a trusted third party
        Third party is a Certificate Authority (CA), trusted by user community
        User deliver public key to CA in a secure manner and obtain a certificate
        User publish the certificate
        Anyone needing this user’s public key can obtain the certificate and verify
         it by attached trusted signature

        X.509 Certificates



                                                                                       28




Raja Khurram Shahzad
Key Distribution using Asymmetric Encryption




                                                         29

                            Public-Key Certificate Use
Raja Khurram Shahzad
X.509 Certificates

  •   Standard for a Public Key Infrastructure (PKI)
        Set of hardware, software, people, policies and procedures needed to
         create, manage, store, distribute and revoke digital certificates based
         on asymmetric cryptography


  •   Distributed set of servers that maintains a database about users.

  •   Assumes a strict hierarchical system of certificate authorities (CAs)
      for issuing the certificates

  •   Each certificate contains the public key of a user and is signed with
      the private key of a CA.

  •   Is used in S/MIME, IP Security, SSL/TLS and SET.
                                                                                   30


  •   RSA is recommended to use.
Raja Khurram Shahzad
X.509 Certificates

  •   A certification authority issues a certificate binding a public key to
      a particular distinguished user
        A certificate authority or certification authority (CA) is an entity which
         issues digital certificates for use by other parties. It is an example of
         a trusted third party. There are many commercial CAs that charge for
         their services. Institutions and governments may have their own
         CAs, and there are free CAs.


  •   An organization's trusted root certificates can be distributed to all
      employees so that they can use the company PKI system

  •   X.509 also includes standards for certificate revocation list (CRL)
      implementations


                                                                                      31




Raja Khurram Shahzad
X.509 Certificates




                                                      32



                          ET2437 - Network Security
Raja Khurram Shahzad
X.509 Certificates




                                                      33



                          ET2437 - Network Security
Raja Khurram Shahzad
X.509 Formats




                                                    34



                        ET2437 - Network Security
Raja Khurram Shahzad
Obtaining a User’s Certificate

    •    Characteristics of certificates generated by CA:

           Any user with access to the public key of the CA can recover the
            user public key that was certified.

           No part other than the CA can modify the certificate without this
            being detected.




                                                                                35



                                  ET2437 - Network Security
Raja Khurram Shahzad
Revocation of Certificates

    •   Reasons for revocation:

           The users secret key is assumed to be compromised.
           The user is no longer certified by this CA.
           The CA’s certificate is assumed to be compromised.




                                                                 36



                                   ET2437 - Network Security
Raja Khurram Shahzad
37



                       ET2437 - Network Security
Raja Khurram Shahzad

Weitere ähnliche Inhalte

Was ist angesagt?

Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Venkatesh Jambulingam
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail securityDr.Florence Dayana
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography
CryptographyCryptography
Cryptographysubodh pawar
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature StandardSou Jana
 

Was ist angesagt? (20)

Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Cryptography
CryptographyCryptography
Cryptography
 
Hash Function
Hash FunctionHash Function
Hash Function
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 

Andere mochten auch

key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution MethodsGulcin Yildirim Jelinek
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Network security
Network securityNetwork security
Network securitynageshkanna13
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
 
Merkle Trees
Merkle TreesMerkle Trees
Merkle TreesDavid Evans
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
Ch01
Ch01Ch01
Ch01n C
 

Andere mochten auch (20)

key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Ch14
Ch14Ch14
Ch14
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Fuzzy Set | Statistics
Fuzzy Set | StatisticsFuzzy Set | Statistics
Fuzzy Set | Statistics
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Key management
Key managementKey management
Key management
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Hash functions
Hash functionsHash functions
Hash functions
 
Merkle Trees
Merkle TreesMerkle Trees
Merkle Trees
 
Fuzzy Set
Fuzzy SetFuzzy Set
Fuzzy Set
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Ch01
Ch01Ch01
Ch01
 

Ähnlich wie Lecture 9 key distribution and user authentication

BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3limsh
 
6. Kerberos.ppt
6. Kerberos.ppt6. Kerberos.ppt
6. Kerberos.pptMadhusatish1
 
Gunaspresentation1
Gunaspresentation1Gunaspresentation1
Gunaspresentation1anchalaguna
 
Kerberos realms & multiple kerberi
Kerberos realms & multiple kerberiKerberos realms & multiple kerberi
Kerberos realms & multiple kerberiManas Nayak
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos ProtocolNetwax Lab
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh rajDBNCOET
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptxShashwat Shriparv
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptxShashwat Shriparv
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptographyAbhishek Kesharwani
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocolAjit Dadresa
 
Kerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsKerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsArunangshu Bhakta
 
kerb.ppt
kerb.pptkerb.ppt
kerb.pptJdQi
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to KerberosShumon Huque
 

Ähnlich wie Lecture 9 key distribution and user authentication (20)

BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
 
kerberos
kerberoskerberos
kerberos
 
6. Kerberos.ppt
6. Kerberos.ppt6. Kerberos.ppt
6. Kerberos.ppt
 
Gunaspresentation1
Gunaspresentation1Gunaspresentation1
Gunaspresentation1
 
Kerberos realms & multiple kerberi
Kerberos realms & multiple kerberiKerberos realms & multiple kerberi
Kerberos realms & multiple kerberi
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Kerberos
KerberosKerberos
Kerberos
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Kerberos and its application in cross realm operations
Kerberos and its application in cross realm operationsKerberos and its application in cross realm operations
Kerberos and its application in cross realm operations
 
kerb.ppt
kerb.pptkerb.ppt
kerb.ppt
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 

Mehr von rajakhurram

Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificatesrajakhurram
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryptionrajakhurram
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction rajakhurram
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 

Mehr von rajakhurram (14)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificates
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 

KĂźrzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

KĂźrzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Lecture 9 key distribution and user authentication

  • 2. Overview • Symmetric Key Distribution using Symmetric Encryption  Kerberos • Key Distribution using Asymmetric Encryption  X.509 Certificates 2 Raja Khurram Shahzad
  • 3. Symmetric Key Distribution • Two parties must share same key  Protected from the access of others  Frequent key exchange to limit amount of data compromised • Key can be exchanged 1. Physical delivery to B 2. A third party physically deliver it to A and B 3. Re-usage of old key to exchange new key 4. A & B both communicate securely with C, C delivers the key  For option 1 & 2 require manual delivery  For option 3 link encryption or end-to-end encryption, What if old key is compromised 3 Raja Khurram Shahzad
  • 4. Symmetric Key Distribution  For option 4 two kinds of keys are used – Session Key: One time key – Permanent Key: for distributing session key. – Necessary element, Key Distribution Center (KDC): determines which systems are allowed to communicate with each other. – Operation of KDC • A wish to communicate B, transmits request to KDC. Communication is encrypted using a master key • KDC approves connection and creates one time session key. Session key is encrypted with permanent keys of A & B and delivered to A & B. • A & B set up logical connection and uses session key.  Most widely application to use this approach is KERBEROS 4 Raja Khurram Shahzad
  • 5. Security Concerns • Key concerns are confidentiality and timeliness • To provide confidentiality must encrypt identification and session key info which requires the use of previously shared private or public keys • Need timeliness to prevent replay attacks • Provided by using sequence numbers or timestamps or challenge/response 5 ET2437 - Network Security Raja Khurram Shahzad
  • 6. KERBEROS In Greek mythology, a many headed dog, the guardian of the entrance of Hades 6 ET2437 - Network Security Raja Khurram Shahzad
  • 7. KERBEROS • Users wish to access services on servers. • Three threats exist:  User pretend to be another user.  User alter the network address of a workstation.  User eavesdrop on exchanges and use a replay attack. 7 ET2437 - Network Security Raja Khurram Shahzad
  • 8. KERBEROS • Assumes a distributed client/server architecture • Provides a centralized authentication server to authenticate users to servers and servers to users. • Relies on conventional encryption, making no use of public- key encryption • Two versions: version 4 and 5 • Version 4 makes use of DES 8 ET2437 - Network Security Raja Khurram Shahzad
  • 9. Requirements for Kerberos • Secure:  Eavesdropper should not be able to obtain the necessary information to impersonate a user • Reliable:  Kerberos should employ a distributed server architecture, systems backing up each other • Transparent:  User should not be aware that authentication is taking place • Scalable:  The system should be capable of supporting large number of clients and servers 9 ET2437 - Network Security Raja Khurram Shahzad
  • 10. Overview of Kerberos • AS = Authentication Server • SS = Service Server • TGS = Ticket-Granting Server • TGT = Ticket Granting Ticket • User Client-based Logon  A user enters a username and password on the client machine.  The client performs a one-way function (hash usually) on the entered password, and this becomes the secret key of the client/user. 10 Raja Khurram Shahzad
  • 11. Overview of Kerberos • Client Authentication  The client sends a clear text message of the user ID to the AS requesting services on behalf of the user. (Note: Neither the secret key nor the password is sent to the AS.) – The AS generates the secret key by hashing the password of the user found at the database.  The AS checks client rights in its database. If valid, the AS sends back the following two messages to the client: – Message A: Client/TGS Session Key encrypted using the secret key of the client/user. – Message B: Ticket-to Get-Ticket (which includes the client ID, client network address, ticket validity period, and the client/TGS session key) encrypted using the secret key of the TGS. 11 Raja Khurram Shahzad
  • 12. Overview of Kerberos  Client receives messages A and B, and decrypt message A to obtain the Client/TGS Session Key. – The session key is used for further communications with the TGS. (Note: The client cannot decrypt Message B, as it is encrypted using TGS's secret key.) 12 Raja Khurram Shahzad
  • 13. Overview of Kerberos • Client Service Authorization  When requesting services, the client sends the following two messages to the TGS: – Message C: Composed of the TGT from message B and the ID of the requested service. – Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key.  TGS retrieves message B out of message C. It decrypts message B using the TGS secret key to have "client/TGS session key". Using this key, the TGS decrypts message D (Authenticator) and sends the following two messages to the client: – Message E: Client-to-server ticket (which includes the client ID, client network address, validity period and Client/Server Session Key) encrypted using the service's secret key. – Message F: Client/server session key encrypted with the Client/TGS Session Key. 13 Raja Khurram Shahzad
  • 14. Overview of Kerberos • Client Service Authorization  For requesting services, the client sends the following two messages to the TGS: – Message C: Composed of the TGT from message B and the ID of the requested service. – Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key.  TGS retrieves message B out of message C. – It decrypts message B using the TGS secret key. This gives it the "client/TGS session key". Using this key, the TGS decrypts message D (Authenticator) and sends the following two messages to the client: • Message E: Client-to-server ticket (which includes the client ID, client network address, validity period and Client/Server Session Key) encrypted using the service's secret key. • Message F: Client/server session key encrypted with the Client/TGS Session Key. 14 Raja Khurram Shahzad
  • 15. Overview of Kerberos • Client Service Request  Client receives messages E and F from TGS.  The client connects to the SS and sends the following two messages: – Message E from the previous step (the client-to-server ticket, encrypted using service's secret key). – Message G: a new Authenticator, which includes the client ID, timestamp and is encrypted using client/server session key.  The SS decrypts the ticket using its own secret key to retrieve the Client/Server Session Key. Using the sessions key, SS decrypts the Authenticator and sends the following message to the client to confirm its true identity and willingness to serve the client: – Message H: the timestamp found in client's Authenticator plus 1, encrypted using the Client/Server Session Key.  ƒ The client decrypts the confirmation using the Client/Server Session Key and checks whether the timestamp is correctly updated. If so, then the client can trust the server and can start issuing service requests to the server. 15  The server provides the requested services to the client. Raja Khurram Shahzad
  • 16. Overview of Kerberos 16 ET2437 - Network Security Raja Khurram Shahzad
  • 17. Kerberos Version 4 • Terms:  C = Client  AS = authentication server  V = server  IDc = identifier of user on C  IDv = identifier of V  Pc = password of user on C  ADc = network address of C  Kv = secret encryption key shared by AS and V  TS = timestamp  || = concatenation 17 ET2437 - Network Security Raja Khurram Shahzad
  • 18. A Simple Authentication Dialogue (1) C  AS: IDc || Pc || IDv (2) AS  C: Ticket (3) C  V: IDc || Ticket • Ticket = EKv[IDc || Pc || IDv] 18 ET2437 - Network Security Raja Khurram Shahzad
  • 19. Remaining problems 2. Number of times that a user has to enter a password 4. Plain-text transmission of password 19 ET2437 - Network Security Raja Khurram Shahzad
  • 20. More secure Authentication Dialogue Once per user logon session: • C  AS: IDC || IDtgs • AS  C: EKc [ Tickettgs ] Once per type of service: (3) C  TGS: IDC || IDV ||Tickettgs (4) TGS  C: TicketV Once per service session: (5) C  V: IDC || TicketV 20 ET2437 - Network Security Raja Khurram Shahzad
  • 21. Remaining problems 3. The lifetime associated with the ticket-granting ticket 5. Servers are not able to authenticate themselves 21 ET2437 - Network Security Raja Khurram Shahzad
  • 22. Version 4 Authentication Dialogue Authentication Service Exhange: To obtain Ticket-Granting Ticket • C  AS: IDc || IDtgs ||TS1 • AS  C: EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs] Ticket-Granting Service Echange: To obtain Service-Granting Ticket (3) C  TGS: IDv ||Tickettgs ||Authenticatorc (4) TGS  C: EKc [Kc,¨v|| IDv || TS4 || Ticketv] Client/Server Authentication Exhange: To Obtain Service (5) C  V: Ticketv || Authenticatorc (6) V  C: EKc,v[TS5 +1] 22 ET2437 - Network Security Raja Khurram Shahzad
  • 23. Version 4 Authentication Dialogue • Problems:  Lifetime associated with the ticket-granting ticket  If to short  repeatedly asked for password  If to long  greater opportunity to replay • The threat is that an opponent will steal the ticket and use it before it expires 23 ET2437 - Network Security Raja Khurram Shahzad
  • 24. Overview of Kerberos 24 ET2437 - Network Security Raja Khurram Shahzad
  • 25. Request for Service in Another Realm 25 ET2437 - Network Security Raja Khurram Shahzad
  • 26. Difference Between Version 4 and 5 • Encryption system dependence (V.4 DES) • IP - Internet protocol dependence • Message byte ordering • Ticket lifetime • Authentication forwarding • Inter realm authentication 26 ET2437 - Network Security Raja Khurram Shahzad
  • 27. Kerberos - in practice • Currently have two Kerberos versions:  4 : restricted to a single realm  5 : allows inter-realm authentication, in beta test • Kerberos v5 is an Internet standard • Specified in RFC1510, and used by many utilities • To use Kerberos:  need to have a Key Distribution Center (KDC) on your network  need to have Kerberised applications running on all participating systems  major problem - US export restrictions  Kerberos cannot be directly distributed outside the US in source format (& binary versions must obscure crypto routine entry points and have no encryption)  else crypto libraries must be re-implemented locally 27 ET2437 - Network Security Raja Khurram Shahzad
  • 28. Key Distribution using Asymmetric Encryption • Problem : The distribution of Public Keys  What if a fake user imparsionate to be a legitimate user and distribute his keys • Solution : Public-Key Certificates  Consists of a public key + User ID of the key owner with whole block signed by a trusted third party  Third party is a Certificate Authority (CA), trusted by user community  User deliver public key to CA in a secure manner and obtain a certificate  User publish the certificate  Anyone needing this user’s public key can obtain the certificate and verify it by attached trusted signature  X.509 Certificates 28 Raja Khurram Shahzad
  • 29. Key Distribution using Asymmetric Encryption 29 Public-Key Certificate Use Raja Khurram Shahzad
  • 30. X.509 Certificates • Standard for a Public Key Infrastructure (PKI)  Set of hardware, software, people, policies and procedures needed to create, manage, store, distribute and revoke digital certificates based on asymmetric cryptography • Distributed set of servers that maintains a database about users. • Assumes a strict hierarchical system of certificate authorities (CAs) for issuing the certificates • Each certificate contains the public key of a user and is signed with the private key of a CA. • Is used in S/MIME, IP Security, SSL/TLS and SET. 30 • RSA is recommended to use. Raja Khurram Shahzad
  • 31. X.509 Certificates • A certification authority issues a certificate binding a public key to a particular distinguished user  A certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. There are many commercial CAs that charge for their services. Institutions and governments may have their own CAs, and there are free CAs. • An organization's trusted root certificates can be distributed to all employees so that they can use the company PKI system • X.509 also includes standards for certificate revocation list (CRL) implementations 31 Raja Khurram Shahzad
  • 32. X.509 Certificates 32 ET2437 - Network Security Raja Khurram Shahzad
  • 33. X.509 Certificates 33 ET2437 - Network Security Raja Khurram Shahzad
  • 34. X.509 Formats 34 ET2437 - Network Security Raja Khurram Shahzad
  • 35. Obtaining a User’s Certificate • Characteristics of certificates generated by CA:  Any user with access to the public key of the CA can recover the user public key that was certified.  No part other than the CA can modify the certificate without this being detected. 35 ET2437 - Network Security Raja Khurram Shahzad
  • 36. Revocation of Certificates • Reasons for revocation:  The users secret key is assumed to be compromised.  The user is no longer certified by this CA.  The CA’s certificate is assumed to be compromised. 36 ET2437 - Network Security Raja Khurram Shahzad
  • 37. 37 ET2437 - Network Security Raja Khurram Shahzad