0% found this document useful (0 votes)
17 views

Network Security Unit 2

Uploaded by

Satyam Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Network Security Unit 2

Uploaded by

Satyam Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Network Security: Authentication Applications

Unit : 2
Outlines:

• Introduction
• Kerberos
• X.509 Public Key Infrastructure (PKI)
• Directory Authentication Service (DAS)
• Pretty Good Privacy (PGP)
• S/MIME (Secure/Multipurpose Internet Mail Extensions)
• Conclusion
Introduction:
Importance of authentication in network security

Different types of authentication methods


• In the realm of network security,
authentication plays a pivotal role,
The acting as the gatekeeper that
verifies the identity of users or
Gatekeeper: devices attempting to access a
Authentication network or resource.
• This process ensures that only
in Network authorized entities gain access,
Security safeguarding sensitive information
and resources from unauthorized
intrusion.
Prevents unauthorized access: By verifying user
identity, authentication safeguards sensitive data and
resources from unauthorized individuals who might
attempt to steal, modify, or disrupt them.
Enhances accountability: Knowing the identity of
users accessing a network allows for tracking and
auditing of activity, promoting accountability and
WHY IS deterring malicious behavior.
AUTHENTICATI
Maintains regulatory compliance: Many industries
ON IMPORTANT? have regulations mandating specific authentication
controls to ensure the protection of sensitive data.

Strengthens overall security posture: A robust


authentication system forms a critical layer of
defense within a layered security framework,
mitigating risks associated with unauthorized access.
DIFFERENT TYPES OF
AUTHENTICATION METHODS:

Something You Something You


Know: Have:

Multi-Factor
Something You
Authentication
Are:
(MFA):
Something You Know:

Passwords: The most common method, requiring users to enter a secret combination of
characters. However, passwords are susceptible to brute-force attacks, phishing
attempts, and social engineering tactics.

Personal Identification Numbers (PINs): Often used for ATM access or mobile
device unlocking, PINs offer a layer of security but can be vulnerable to shoulder
surfing or theft.
Something You Have:

Security tokens: Hardware devices that generate unique codes for authentication,
adding an extra layer of security compared to passwords alone.

Smart cards: Similar to security tokens, but often contain additional functionalities
beyond authentication.
Fingerprint scanners: Relatively common for mobile device unlocking and secure access systems, offering
a higher level of security compared to knowledge-based factors.

Facial recognition: Gaining traction in various applications, but concerns exist regarding accuracy, privacy,
and potential biases.

Iris scanners: Considered a highly secure method due to the unique nature of iris patterns, but adoption is
still limited.

Something You Are:


For enhanced security, many systems employ
multi-factor authentication (MFA).

Multi-Factor This approach combines two or more of the


categories mentioned above, requiring users to
Authentication provide multiple verification factors to gain access.

(MFA):
For example, a system might require a password
(something you know) along with a code generated
by a security token (something you have) for a
more secure login process.
Kerberos: A Secure Ticket-Based
Authentication System
Overview

Working Principles

Advantages

Disadvantages
Overview

Kerberos emerges as a widely deployed centralized ticket-based


authentication system.

It utilizes a trusted third party, the Kerberos server, to securely


authenticate users and services within a network.

Kerberos eliminates the need for users to transmit their passwords across the
network for each service they access. Instead, it issues temporary tickets
that grant users secure access to specific services.
Working Principles:

User login: TGT Service ticket Service ticket Service


acquisition: request: issuance: access:
Advantages of
Kerberos:
• Enhanced Security: Kerberos eliminates the need for
passwords to traverse the network unencrypted,
reducing the risk of password sniffing and unauthorized
access.
• Centralized Authentication: The Kerberos server acts
as a central point for user authentication, simplifying
administration and management of user credentials.
• Mutual Authentication: Both the user and the service
provider are authenticated during the process, ensuring
authorized access on both sides.
• Reduced Network Traffic: By issuing temporary
tickets, Kerberos minimizes the transmission of
sensitive credentials across the network.
Disadvantages of Kerberos:
• Single Point of Failure: The Kerberos server
represents a single point of failure. If compromised,
the entire authentication system becomes vulnerable.
• Complexity: Setting up and managing a Kerberos
environment can be complex, requiring careful
configuration of various components.
• Limited Scalability: Kerberos might not be ideal for
highly dynamic environments with frequent changes
in users or services.
X.509 Public Key Infrastructure
(PKI): A Secure Web of Trust
• Introduction
• Components
• Advantages
• Disadvantages
Introduction:
• Imagine a world where you can verify the identity of websites
you visit or the people you email with online.
• X.509 PKI establishes a framework for this very purpose.
• It leverages a network of trusted entities called Certification
Authorities (CAs) that issue digital certificates to bind a
public key to a specific identity.
• These certificates act as electronic credentials that vouch for
the legitimacy of an entity (person, website, server, etc.) in the
digital world.
Essential Components:
• Digital Certificates:
• Certification Authorities (CAs):
• Public Key Infrastructure (PKI):
Digital Certificates: These
electronic documents contain
critical information
The entity's public key

The entity's identity (name, organization, etc.)

The issuing CA's information

Validity period of the certificate

Digital signature of the issuing CA


Certification Authorities (CAs): These trusted third-party
organizations play a vital role in the PKI ecosystem:

Issuing Certificates: CAs verify the identity of entities requesting


certificates and issue them after proper validation.

Revoking Certificates: If a certificate becomes compromised or needs to


be invalidated, CAs can revoke it to prevent its misuse.

Maintaining Trust: CAs act as trusted entities within the PKI hierarchy,
ensuring the validity and authenticity of issued certificates.
Public Key
Infrastructure (PKI):
• This broad term encompasses the
entire framework, including
• CAs,
• digital certificates,
• certificate management protocols, and
t
• rusted relationships between entities
involved.
Strong Authentication: By relying on public key
cryptography, PKI offers robust authentication
mechanisms compared to traditional username-
password combinations.

Scalability and Flexibility: The PKI framework can


Advantages of be scaled to accommodate various applications, from
X.509 PKI: securing websites (HTTPS) to email encryption
(S/MIME) and electronic signatures.

Non-Repudiation: Digital signatures within


certificates ensure non-repudiation, meaning the
signer cannot deny having signed a document.
Disadvantages
of X.509 PKI:
• Reliance on Trusted CAs: The entire
system hinges on the trustworthiness of CAs.
If a CA is compromised, it could issue
fraudulent certificates, jeopardizing the
entire PKI system.
• Complexity of Management: Managing
certificates across a large organization or
network can be complex, requiring proper
infrastructure and skilled personnel.
Introduction

Types of DAS
Directory
Authentication Functionality
Service (DAS)
Advantages

Disadvantages
Directory Authentication Service (DAS): A
Centralized Hub for User Management
DAS acts as a central hub that stores user credentials (usernames, passwords,
group memberships) and other relevant information.

This information is then utilized by various network services and applications


to authenticate users and determine their access privileges.

Imagine a library card catalog, but instead of books, it stores user information
and access rights for various digital resources.
Common Types of DAS:

Lightweight Directory Access Protocol (LDAP): This widely used, open-standard protocol offers a
flexible and platform-independent approach to directory services. It uses a hierarchical structure to
organize user information, allowing for efficient access and management.

Active Directory: Developed by Microsoft, Active Directory is a proprietary directory service tightly
integrated with the Windows Server ecosystem. It offers a comprehensive set of features for user and group
management within a Windows environment.
Centralized User Credential
Storage:

Functionality User Authentication:


of a DAS:

Access Control:
Advantages of Using a DAS:

SIMPLIFIED ENHANCED INTEGRATION WITH


ADMINISTRATION: SECURITY: SECURITY
SOLUTIONS:
Disadvantages of Using a DAS:

Single Point of Failure: Configuration Complexity:


Pretty Good • Introduction

Privacy • Key Features


• Advantages

(PGP) • Disadvantages
Pretty Good Privacy (PGP):
Securing Emails in a
Decentralized World
• In the realm of email security, Pretty Good
Privacy (PGP) stands out as an open-source
public-key cryptography system.
• Unlike PKI (Public Key Infrastructure) with its
centralized trust model, PGP operates on a
decentralized "web of trust" principle.
Key Features of PGP:

Confidentiality
User-Managed
and
Keys:
Authentication:

Digital
Encryption:
Signatures:
Advantages of PGP:

Decentralized Trust: Open-Source Strong Cryptography:


Transparency:
Disadvantages of PGP:

Complexity for Key Management


Limited Adoption:
Users: Challenges:
S/MIME:
Secure/Multipurpose
Internet Mail Extensions
• Introduction
• Functionality
• Advantages
• Disadvantages
S/MIME: Securing
Emails with Trusted
Credentials
• In the ever-evolving landscape of email security,
S/MIME (Secure/Multipurpose Internet Mail
Extensions) emerges as a robust and widely adopted
standard.
• Unlike PGP's decentralized approach, S/MIME leverages
the established trust model of X.509 Public Key
Infrastructure (PKI) to provide secure email
communication.
Functionality of S/MIME:

DIGITAL ENCRYPTION
SIGNATURE
Advantages of S/MIME:

Widespread Adoption: Strong Security Features: Simplified Management


for Organizations:
Disadvantages of S/MIME:

CERTIFICATE INTEROPERABILI CENTRALIZED


MANAGEMENT: TY ISSUES: TRUST MODEL:
• Kerberos: A centralized ticket-based system ideal for secure logins
within a controlled network environment. However, it introduces a
single point of failure and requires careful configuration.
• X.509 PKI: This framework utilizes digital certificates and a trust
hierarchy for robust authentication. Its widespread adoption and
scalability make it attractive, but the security of the entire system
hinges on the trustworthiness of CAs.
• Directory Authentication Services (DAS): A centralized repository

Conclusion: for user credentials simplifies administration and access control.


However, the security of the DAS server is critical, and proper
configuration is essential.
• Pretty Good Privacy (PGP): This decentralized public-key
cryptography system empowers users with control, but managing keys
and establishing trust relationships can be complex.
• S/MIME: Leverages the existing PKI infrastructure for email
security, offering strong encryption and digital signatures. While it
benefits from wider adoption, certificate management and
interoperability issues require consideration.
• Security Needs: The level of security required for the specific
application or network environment plays a crucial role. High-security
environments might necessitate PKI or Kerberos, while less sensitive
scenarios could benefit from simpler solutions like S/MIME or user
passwords with two-factor authentication (2FA).
• Scalability: The size and complexity of the network or user base must
Choosing be considered. Scalable solutions like PKI or DAS might be preferable
for large organizations, while smaller setups could function well with

the Right
simpler options.
• Usability: The ease of use and management for both users and

Tool: administrators is important. Complex solutions like PGP might not be


ideal for non-technical users, while user-friendly options like S/MIME
integrated with email clients can streamline adoption.
• Cost: The cost of deploying and maintaining the chosen
authentication application needs to be factored in. Open-source
solutions like PGP might be attractive for cost-conscious
environments, while enterprise-grade PKI deployments might involve
licensing fees.

You might also like