Lecture 4.3
Lecture 4.3
Trusted Center:
Kerberos Servers:
• Authentication ServerThe authentication server (AS) is the KDC in
the Kerberos protocol.
• Ticket-Granting Server (TGS): The ticket-granting server (TGS)
issues a ticket for the real server (Bob).
• Real Server: The real server (Bob) provides services for the user.
Example:
The minor differences between version 4 and version 5 are briefly listed
below:
1 Version 5 has a longer ticket lifetime.
2 Version 5 allows tickets to be renewed.
3 Version 5 can accept any symmetric-key algorithm.
4 Version 5 uses a different protocol for describing data types.
5 Version 5 has more overhead than version 4.
E-mail architecture:
• In e-mail security, the sender of the message needs to include the name
or identifiers of the algorithms used in the message.
• Certificates: It is obvious that some public-key algorithms must be
used for e-mail security.
1 Key generation
2 Encryption
3 Digital Signature
4 Key distribution
5 Web of trust
6 Key revocation
7 Compatibility
8 OpenPGP Standard
Summary:
• PGP provides a robust and widely adopted framework for securing email
communications.
• It addresses confidentiality through encryption.
• It ensures message integrity through digital signatures.
• It establishes a web of trust to enhance the reliability of public keys.
While PGP is effective, it requires some effort from users to manage
their keys and build trust relationships within the web of trust.
PGP Services:
• Digital signature: DSS/SHA or RSA/SHA.
• Message encryption: Cast-128, IDEA, or 3-DES.
• One-time session key: For each email message.
• Session key distribution: Diffie-Hellman key-exchange protocol or
RSA.
• Message Compression: with ZIP.
• Email compatible: Radix-64 binary-to-ASCII conversion.
• Segmentation: To accommodate max message size limitatiosn
PGP Services:
• Code conversion:Another service provided by PGP is code conversion.
PGP uses Radic-64 conversion
• Segmentation: PGP allows segmentation of the messages.
PGP Certificates:
• X.509 Certificates: Protocols that use X.509 certificates depend on
the hierarchical structure of the trust.
• In X.509, there is a single path from the fully trusted authority to any
certificate.
• In PGP, there is no need for CAs; anyone in the ring can sign a certifi-
cate for anyone else in the ring.
Remark: In PGP, there can be multiple paths from fully or partially trusted
authorities to any subject.
PGP Certificates:
• Trust and Legitimacy: The entire operation of PGP is based on
introducer trust, the certificate trust, and the legitimacy of the public
keys.