Kerberos Authentication Protocol
Kerberos Authentication Protocol
What is kerberos authentication protocol what are its significance what are its step. what is TGT and its
component AS and TGS what are its steps authentication processes
Kerberos is a network authentication protocol. It provides a centralised authentication server whose function is to
authenticate users to servers and servers to users. In Kerberos Authentication server and database is used for client
authentication. Kerberos runs as a third-party trusted server known as the Key Distribution Center (KDC). Each user
and service on the network is a principal.
● Step-1:
User login and request services on the host. Thus user requests for ticket-granting service.
● Step-2:
Authentication Server verifies user’s access right using database and then gives ticket-granting-ticket and
session key. Results are encrypted using the Password of the user.
● Step-3:
The decryption of the message is done using the password then send the ticket to Ticket Granting Server. The
Ticket contains authenticators like user names and network addresses.
● Step-4:
Ticket Granting Server decrypts the ticket sent by User and authenticator verifies the request then creates the
ticket for requesting services from the Server.
● Step-5:
The user sends the Ticket and Authenticator to the Server.
● Step-6:
The server verifies the Ticket and authenticators then generate access to the service. After this User can access
the services.
Kerberos Limitations
● Service Modification: Each network service needs individual modification for Kerberos use.
● Timeshare Challenge: Not ideal for environments with shared workstations.
● Secured Server: Kerberos server must be securely maintained to avoid compromises.
● Always-On Requirement: The Kerberos server must be continuously available for authentication.
● Single-Key Encryption: All passwords are encrypted with a single master key, posing a security risk
if compromised.
● Assumed Workstation Security: Kerberos assumes workstation security; compromised
workstations can lead to unauthorized access.
● Loss of Trust Risk: Compromised Key Distribution Center (KDC) can lead to a loss of trust
throughout the network.
● Scalability Challenges: Difficulties in managing and scaling in very large or complex networks.
Significance of kerberos
User Authentication: Kerberos simplifies user authentication by requiring users to enter their
username and password only once. The server then receives encrypted authentication data and
issues a Ticket Granting Ticket (TGT).
Single Sign-On (SSO): With Kerberos, users benefit from Single Sign-On (SSO), logging in once to
access various network resources. Once authenticated, users can access authorized resources
without re-entering credentials.
Mutual Authentication: Kerberos ensures mutual authentication between client and server. Using a
shared secret key, the client decrypts a challenge from the server to prove its identity before
accessing resources.
Authorization: After authentication, Kerberos allows users to submit service tickets for specific
network resources. Users can only access resources they have permission for, based on privileges
and permissions in their service tickets.
Network Security: Kerberos enhances network security with a central authentication server. This
server manages user credentials and access restrictions, preventing unauthorized access to sensitive
data and resources.
What is t o c t u explain it with an example related to cyber security. Explain is consequences for example route
access.
Time of Check to Time of Use (TOCTOU) error is a type of non malcious programm error.
Time of Check to Time of Use (TOCTOU) error is a type of software vulnerability that occurs in situations where a
resource or condition is checked at one point in time (time of check), but its status or value changes before it is used
(time of use). This time gap between checking and using can create a window of opportunity for attackers to
manipulate the system in malicious ways.
Time of Check (TOC): The program checks the status of a resource or condition, such as the existence of afile,
permissions.
Time of Use (TOU): between the time of the check and the time of use, the status or value of the resource may have
changed due to actions by other processes or users.
Example In Unix, the following C code, when used in a setuid program, has a TOCTOU bug:
Victim Attacker
if (access("file", W_OK) != 0) {
exit(1);
}
After the access check, before the open, the attacker replaces file with
a symlink to the Unix password file /etc/passwd:
symlink("/etc/passwd", "file");
fd = open("file", O_WRONLY);
write(fd, buffer, sizeof(buffer));
In this example, an attacker can exploit the race condition between the access and open to trick the setuid victim into
overwriting an entry in the system password database. TOCTOU races can be used for privilege escalation to get
administrative access to a machine.
examples of scenarios where TOCTOU vulnerabilities can occur
Once the attacker has intercepted the communication, they can read, modify, or inject messages to disrupt the
communication between the two parties. They can also use the opportunity to steal sensitive information, such as
usernames, passwords, or credit card numbers.
Preventions of Man-in-the-middle attack
1. WAP Encryption: Strong encryption on Wireless Access Points (WAPs) prevents unauthorized access by
those physically close to the network. Vulnerable encryption makes brute-force attacks easier, enabling
intruders to launch Man-in-the-Middle (MITM) attacks.
2. Use a VPN: Implementing a Virtual Private Network (VPN) encrypts web traffic, making it difficult for
hackers to read or modify data. This provides an added layer of security against MITM attacks.
3. Public Key Pair Authentication: Utilizing public key pair authentication, such as RSA, ensures that
communication partners are authentic and not spoofed, adding another layer of protection against MITM
attacks.
4. Strong Network User Credentials: Modifying primary email logins and router password hashes is essential.
Hackers who access router login details can redirect traffic to fraudulent servers or inject malware.
5. Communication Security: Enable two-factor authentication (2FA) for accounts, requiring an additional
verification factor alongside login credentials. This adds a robust layer of protection against unauthorized
access.
6. Endpoint security These attacks combine with malware to gain unrestricted access to your device or IT
network.
7. strong endpoint security software to protect against these threats. The best security software, such as
Kaspersky Endpoint Security.Avoid Public Wi-Fi: Configure devices to require manual connections to
public Wi-Fi networks, reducing the risk of unwittingly connecting to malicious networks that could facilitate
MITM attacks.
What is a trap door what are its significance and vulnerability in context of cyber security.
a "trapdoor" refers to a hidden vulnerability intentionally inserted into a system, software, or cryptographic algorithm
by its creator so that an application, operating system (OS) or data can be accessed for troubleshooting or other
purposes
A trapdoor attack is a way to access a computer system or encrypted data that bypasses the system's customary
security mechanisms.. These attacks let attackers gain control of system resources, perform network reconnaissance
and install different types of malware. In some cases, attackers design a worm or virus to take advantage of an
existing backdoor created by the original developers or from an earlier attack.
Cause of backdoor
Intentional Design:
Developer Access: Trapdoors may be intentionally inserted into software or systems to provide developers
with a way to access the system for maintenance, debugging, or troubleshooting purposes.
Law Enforcement or Governmental Requirements: In some cases, trapdoors are mandated by government
regulations or law enforcement agencies to provide access to encrypted data for national security or law
enforcement purposes.
Programming Errors:
Coding Mistakes: During the development process, coding mistakes or errors could inadvertently create
vulnerabilities that act as trapdoors. For example, a developer might inadvertently leave a password as a
default setting that can be easily exploited.
Incomplete Testing: Insufficient testing of software can lead to undiscovered vulnerabilities that act as
unintentional trapdoors.
Malicious Intent:
Insider Threats: Malicious insiders, such as disgruntled employees or contractors, may intentionally create
trapdoors to gain unauthorized access to systems or data.
External Attackers: Skilled attackers may exploit vulnerabilities in a system to create their own backdoors
for future access.
Cryptographic Design:
Weak Algorithms: In the realm of cryptography, poorly designed algorithms can unintentionally create
trapdoors. These weaknesses can be exploited to break encryption.
Intentional Trapdoors: Cryptographic trapdoors are deliberately created for specific encryption or decryption
purposes, such as public-key cryptography where a private key acts as a trapdoor to decrypt messages.
Outdated Systems:
Legacy Systems: Older systems that have not been updated or maintained properly may contain
vulnerabilities that act as trapdoors. These systems may have been designed at a time when security practices
were not as robust as they are today.
Significance:
1. Access Control: Trapdoors can provide a way for authorized users to access a system without going through
normal authentication procedures. This can be useful for system administrators or developers who need a way
to troubleshoot or maintain the system.
2. Law Enforcement and Intelligence: In some cases, trapdoors are intentionally built into systems to allow law
enforcement or intelligence agencies to access information for investigations or national security purposes.
3. Encryption: In the context of cryptography, a trapdoor can be used to enable certain parties to decrypt data
that was encrypted with a specific key. This is the basis of public-key cryptography, where a private key acts
as a trapdoor to decrypt messages that were encrypted with the corresponding public key.
Vulnerabilities:
1. Unauthorized Access: The most significant vulnerability of trapdoors is that if they are discovered by
unauthorized parties, they can be exploited to gain unauthorized access to systems or data. This could lead to
data breaches, theft of sensitive information, or even complete system compromise.
2. Misuse: Trapdoors can be misused by insiders or attackers who gain access to the system. They can use the
trapdoor to perform actions that they should not be able to do, such as bypassing security controls or
manipulating data.
3. Lack of Transparency: The presence of a trapdoor often means that there is a lack of transparency in the
system. Users may not be aware that such a backdoor exists, which can erode trust in the system.
4. Security Risks: Intentional vulnerabilities like trapdoors go against the principles of security by design. They
introduce unnecessary risks into systems and can make it more difficult to maintain a secure environment.
A computer virus first infact the computer. It enters a system through various means such as infected email
attachments, downloads from untrusted sources, infected removable media (USB drives), or vulnerabilities in
software. Once it enter the computer it life cycle start. .
The life cycle of a computer virus can be divided into four phases:
Dormant phase
The virus is idle in the dormant phase. It has accessed the target device but does not take any action.
Note: Not all viruses have the dormant phase.
Propagation phase
In the propagation phase, the virus starts propagating by replicating itself. The virus places a copy of itself into other
programs or accomplishes certain system areas on the disk. Each infected program will contain a clone of the virus,
which will enter its own propagation phase as well. During this phase virus employ tectics like encrypting its code, to
slightly changes its code to evade signature based detectin to remain undected by computer security
Triggering phase
The triggering phase starts when the dormant virus is activated. It will perform the actions it is supposed to
accomplish. This phase can be caused by various system events like the count of the times the virus has cloned or
after a set time interval has elapsed.
Execution phase
In the execution phase, the payload will be released. It can
Deleting files or corrupting data.
o Stealing sensitive information like passwords or financial data.
o Creating backdoors for remote access by attackers.
o Displaying unwanted messages or pop-ups.
What is salami attack what are its legal and ethical implication in context of cyber security and financial fraud
detection
In a salami attack, attackers make small, incremental changes to a system to steal small amounts of money or
resources. The changes are often so small that they go unnoticed, but they add up to a significant amount when
totaled.
Consequences
Unauthorized Access: Users or processes may gain access to resources they should not have access to.
Data Breaches: If sensitive data is not properly protected by access controls, it could be exposed.
Privilege Escalation: An attacker might gain higher levels of privilege than intended.
Compromised Integrity: Data integrity can be compromised if unauthorized changes are made.
System Compromise: Incomplete mediation can be an entry point for further system compromise.
Unit 04
Proper email security can protect sensitive information in email communications, prevent phishing attacks, spear
phishing, email spoofing, and protect against unauthorized access, loss or compromise of one or more email
addresses.
There are three email security implementation (authorization) methods with sender authentication and
they’re SPF, DKIM, and DMARC.
What is SET protocol and how it protect sensitive information and what SET participant.
● Secure Electronic Transaction (SET) is a method that assures the security and integrity of electronic
transactions made using credit cards.
● SET is not a payment system; rather, it is a secure transaction protocol that is used via the internet.
● The SET protocol provides the following services:
○ It establishes a safe channel of communication between all parties engaged in an e-commerce
transaction.
○ It provides confidentiality since the information is only available to the parties engaged in a transaction
when and when it is needed.
● The SET protocol includes the following participants:
● Cardholder: An authorized holder of a payment card issued by an issuer.
● Merchant: An organization that offers goods or services through a website.
● Issuer: A financial institution that provides the payment cards to cardholders. The issuer is responsible for
issuing the payment cards (such as credit cards or debit cards) to customers.
● Acquirer: A financial institution that establishes an account with the merchant and processes payment card
authorizations and captures. When a customer makes a purchase, the acquirer processes the transaction on
behalf of the merchant.
● Payment Gateway: A function operated by the acquirer to interface between the SET protocol and existing
bankcard payment networks for authorization operations. The payment gateway acts as a secure intermediary
between the merchant's website and the payment networks to facilitate transactions.
● Certification Authority: A trusted entity that issues X.509v3 public key certificates to cardholders,
merchants, and payment gateways. These certificates are used to authenticate the identity of the parties
involved in the transaction and ensure the security of the communication.
SET working
The customer opens an account with a card issuer. MasterCard, Visa, etc .
The customer receives a digital certificate signed by a bank.
A merchant who accepts a certain brand of card must possess two digital certificates. – One for signing & one for key
exchange
The customer places an order for a product or service with a merchant.
The merchant sends a copy of its certificate for verification.
The customer sends order and payment information to the merchant.
The merchant requests payment authorization from the payment gateway prior to shipment.
The merchant confirms order to the customer.
The merchant provides the goods or service to the customer.
The merchant requests payment from the payment gateway.
Below are the main SET protocols which protect sensitive information regarding participants :
SET functionalities:
Provide Authentication
Merchant Authentication – To prevent theft, SET allows customers to check previous relationships between
merchants and financial institutions. Standard X.509V3 certificates are used for this verification.
Customer / Cardholder Authentication – SET checks if the use of a credit card is done by an authorized user
or not using X.509V3 certificates.
Provide Message Confidentiality: Confidentiality refers to preventing unintended people from reading the message
being transferred. SET implements confidentiality by using encryption techniques. Traditionally DES is used for
encryption purposes.
Provide Message Integrity: SET doesn’t allow message modification with the help of signatures. Messages are
protected against unauthorized modification using RSA digital signatures with SHA-1 and some using HMAC with
SHA-1,
o The WAP gateway translates this WAP request into a conventional HTTP URL request and sends it over the
internet.
o When the Web server, the server processes the request just as it would handle any other request and sends the
response back to the request reaches a specified mobile device through WAP gateway.
o Now, the WML file's final response can be seen in the browser of the mobile users.
following are some most used applications of Wireless Application Protocol or WAP:
o WAP facilitates you to access the Internet from your mobile devices.
o It facilitates you to access E-mails over the mobile Internet..
o Online mobile banking is very popular nowadays.
o It can also be used in multiple Internet-based services such as geographical location, Weather forecasting,
Flight information, Movie & cinema information, Traffic updates etc. All are possible due to WAP technology.
Advantages of Wireless Application Protocol (WAP)
Following is a list of some advantages of Wireless Application Protocol or WAP:
o WAP is a very fast-paced technology.
o It is an open-source technology and completely free of cost.
o It can be implemented on multiple platforms.
o It is independent of network standards.
o It provides higher controlling options.
o It is implemented near to Internet model.
o By using WAP, you can send/receive real-time data.
o Nowadays, most modern mobile phones and devices support WAP.
Disadvantages of Wireless Application Protocol (WAP)
Following is a list of some disadvantages of Wireless Application Protocol or WAP:
o The connection speed in WAP is slow, and there is limited availability also.
o In some areas, the ability to connect to the Internet is very sparse, and in some other areas, Internet access is
entirely unavailable.
o It is less secured.
o WAP provides a small User interface (UI).
WAP is designed in a layered fashion, so that it can be extensible, flexible, and scalable. As a result, the WAP protocol
stack is divided into five layers −
specifies the different communications and data transmission layers used in the WAP model:
Application Layer: This layer consists of the Wireless Application Environment (WAE), mobile device
specifications, and content development programming languages, i.e., WML.
Session Layer: The session layer consists of the Wireless Session Protocol (WSP). It is responsible for fast
connection suspension and reconnection.
Transaction Layer: The transaction layer consists of Wireless Transaction Protocol (WTP) and runs on top of UDP
(User Datagram Protocol). This layer is a part of TCP/IP and offers transaction support.
Security Layer: It contains Wireless Transaction Layer Security (WTLS) and responsible for data integrity, privacy
and authentication during data transmission.
Transport Layer: This layer consists of Wireless Datagram Protocol (WDP). It provides a consistent data format to
higher layers of the WAP protocol stack.
Each of these layers provides a well-defined interface to the layer above it. This means that the internal workings of
any layer are transparent or invisible to the layers above it.
S.
No. Secure Socket Layer Secure Electronic Transaction
Basics-
SSL is an encryption mechanism for order taking, Basics-
queries, and other applications and is available on SET is a very comprehensive protocol. It provides
the customer’s browser. privacy, integration, and authenticity.
It does not protect against all security hazards and is It is not used frequently due to its complexity and the
naturally simple and widely used. SSL is a protocol need for a special card reader by the user. It may be
for general-purpose secure message exchange. abandoned if it is not simplified.
1.
SSL protocol may use a certificate, but the payment SET is tailored to the credit card payment to the
gateway is not available. So, the merchant needs to merchant. SET protocols hide the customer’s credit
receive both the ordering information and credit card information from merchant and also hides the
card information because the capturing process order information from banks to protect privacy
should be generated by the merchant. called a dual signature. The SET protocol is
SSL protocol has been the industry standard for complex and more secure.
securing internet communication.
Working- Working-
SSL uses a combination of public-key and The dual signature mechanism is deployed by SET to
3. symmetric-key encryption to safeguard data safeguard a transaction. To use an e-commerce site,
transactions. SET requires the purchase of software. The design of
the protocol necessitates the client’s installation of an
The handshake technique is used by the SSL
e-wallet.
protocol, which permits the server to verify its
S.
No. Secure Socket Layer Secure Electronic Transaction
Integrity- Integrity-
4. The technique of Hash functions is used for this The technique of digital signatures is used for this
purpose. purpose.
Acceptability-
Acceptability-
5. SET acceptability is less because it’s necessary to
Its acceptability is more as compared to SET.
build an open PKI.
Functionality-
Functionality-
The Secure Sockets Layer (SSL) is not a payment
SET was created with the sole purpose of securing
protocol. SSL encrypts the communication channel
6. and ultimately guaranteeing a payment transaction.
between the cardholder and the merchant website
For example, increase in the possibilities for online
and is not backed by any financial institution. As a
retail growth only when consumer confidence grows
result, SSL is unable to ensure the security of a
in online shopping.
transaction.
Encryption- Encryption-
The purpose of SSL lies in prevention of data SET, which was created expressly to address the
7. tampering in client/server applications and has security of all parties involved in an electronic
considerably weaker encryption, with a maximum of payment transaction, uses 1024-bit encryption
128-bit encryption. throughout the transaction.
Authentication-
Authentication-
Here, all parties get authentication to the transaction
8. SSL certificates are not endorsed by any financial
because SET’s certificates are backed not just by a
institution or payment brand association, so they
Certificate Authority, but also by financial
cannot effectively validate all parties.
institutions and MasterCard International.
Security-
Security-
SET enables transaction security from the
9. SSL only protects the cardholder and the merchant, cardholder’s desktop to the merchant via bank
which is insufficient to prevent fraud. SSL approvals and back through the gateway, leaving an
transactions, in other words, are never assured. indisputable audit trail and, as a result, a guaranteed
transaction.
S.
No. Secure Socket Layer (SSL) Secure Electronic Transaction (SET)
1. Basics Basics
- Encryption mechanism for order taking, queries, - Comprehensive protocol for privacy, integration, and
etc. authenticity
2. Developed by Developed by
3. Working Working
4. Integrity Integrity
5. Acceptability Acceptability
- More acceptable compared to SET - Less acceptance due to building open PKI
6. Functionality Functionality
- Not a payment protocol, encrypts communication - Created to secure and guarantee payment transactions
7. Encryption Encryption
8. Authentication Authentication
9. Security Security
S.
No. Secure Socket Layer (SSL) Secure Electronic Transaction (SET)
- Only protects cardholder and merchant, no - Transaction security from cardholder to merchant,
assured transactions guaranteed transaction
WHAT IS 3D SECURE PROTOCOL AND EXPLAIN THE WORKING OF 3D SECURE PROTOCOL ?????
3D Secure is an authentication protocol that was developed by Visa to enhance the security of online payments.
This protocol was made to enhance the security of online payments and protect both the card issuer and the
cardholder from fraudulent activities
The 3D Secure protocol is used to verify the cardholder’s identity during an online transaction. This is done by
requiring the cardholder to provide an additional authentication code sent to their registered mobile number or email
address. The code is used to validate the transaction and ensure that the cardholder is indeed the authorised user of the
card.
3D Secure is so named due to the three-domain model that the technology relies on to provide extra security at online
checkout. These three domains are:
1. Creating a Timestamp:
Data Hashing: The process starts with hashing the original data using a cryptographic hash function.
This hash serves as a unique fingerprint for the data.
Sending Hash to TSA: The hashed data is sent to a Trusted Timestamping Authority (TSA).
Timestamp Addition: The TSA appends a timestamp to the hash.
Hashing the Combination: The TSA then calculates the hash of the combined timestamp and hash.
This new hash is unique to this specific data at that specific time.
2. Digital Signature:
The TSA then signs this new hash with its private key. This signed hash, along with the timestamp, is
returned to the requester.
3. Storage:
The requester stores this signed hash and timestamp along with the original data.
Hash Recalcula on: To verify the mestamp later, the requester recalculates the hash of the original data.
Appending Timestamp: The mestamp from the TSA is appended to this recalculated hash.
Hashing the Concatena on: The requester then hashes this combined value to get Hash A.
The requester uses the TSA's public key to decrypt the digital signature from the original mestamped data.
Hash A and Hash B are compared. If they match, it means the mestamped data has not been altered, and the
mestamp was issued by the TSA.
Advantages:
Tamper-Proof: Once a timestamp is generated and verified, it is nearly impossible to alter without detection.
Verifiability: Timestamps can be easily verified by anyone using the public key of the TSA.
Decentralization (Blockchain): Provides a decentralized and transparent way to timestamp data, making it
useful for a wide range of applications.
Limitations:
Cost: Setting up and maintaining a trusted timestamping infrastructure can be costly.
Dependence on TSA: Relies on the integrity and reliability of the Trusted Timestamping Authority.
Explain email security in contacts of cyber security and write how to achieve it.