Network Security Unit 2
Network Security Unit 2
Unit : 2
Outlines:
• Introduction
• Kerberos
• X.509 Public Key Infrastructure (PKI)
• Directory Authentication Service (DAS)
• Pretty Good Privacy (PGP)
• S/MIME (Secure/Multipurpose Internet Mail Extensions)
• Conclusion
Introduction:
Importance of authentication in network security
Multi-Factor
Something You
Authentication
Are:
(MFA):
Something You Know:
Passwords: The most common method, requiring users to enter a secret combination of
characters. However, passwords are susceptible to brute-force attacks, phishing
attempts, and social engineering tactics.
Personal Identification Numbers (PINs): Often used for ATM access or mobile
device unlocking, PINs offer a layer of security but can be vulnerable to shoulder
surfing or theft.
Something You Have:
Security tokens: Hardware devices that generate unique codes for authentication,
adding an extra layer of security compared to passwords alone.
Smart cards: Similar to security tokens, but often contain additional functionalities
beyond authentication.
Fingerprint scanners: Relatively common for mobile device unlocking and secure access systems, offering
a higher level of security compared to knowledge-based factors.
Facial recognition: Gaining traction in various applications, but concerns exist regarding accuracy, privacy,
and potential biases.
Iris scanners: Considered a highly secure method due to the unique nature of iris patterns, but adoption is
still limited.
(MFA):
For example, a system might require a password
(something you know) along with a code generated
by a security token (something you have) for a
more secure login process.
Kerberos: A Secure Ticket-Based
Authentication System
Overview
Working Principles
Advantages
Disadvantages
Overview
Kerberos eliminates the need for users to transmit their passwords across the
network for each service they access. Instead, it issues temporary tickets
that grant users secure access to specific services.
Working Principles:
Maintaining Trust: CAs act as trusted entities within the PKI hierarchy,
ensuring the validity and authenticity of issued certificates.
Public Key
Infrastructure (PKI):
• This broad term encompasses the
entire framework, including
• CAs,
• digital certificates,
• certificate management protocols, and
t
• rusted relationships between entities
involved.
Strong Authentication: By relying on public key
cryptography, PKI offers robust authentication
mechanisms compared to traditional username-
password combinations.
Types of DAS
Directory
Authentication Functionality
Service (DAS)
Advantages
Disadvantages
Directory Authentication Service (DAS): A
Centralized Hub for User Management
DAS acts as a central hub that stores user credentials (usernames, passwords,
group memberships) and other relevant information.
Imagine a library card catalog, but instead of books, it stores user information
and access rights for various digital resources.
Common Types of DAS:
Lightweight Directory Access Protocol (LDAP): This widely used, open-standard protocol offers a
flexible and platform-independent approach to directory services. It uses a hierarchical structure to
organize user information, allowing for efficient access and management.
Active Directory: Developed by Microsoft, Active Directory is a proprietary directory service tightly
integrated with the Windows Server ecosystem. It offers a comprehensive set of features for user and group
management within a Windows environment.
Centralized User Credential
Storage:
Access Control:
Advantages of Using a DAS:
(PGP) • Disadvantages
Pretty Good Privacy (PGP):
Securing Emails in a
Decentralized World
• In the realm of email security, Pretty Good
Privacy (PGP) stands out as an open-source
public-key cryptography system.
• Unlike PKI (Public Key Infrastructure) with its
centralized trust model, PGP operates on a
decentralized "web of trust" principle.
Key Features of PGP:
Confidentiality
User-Managed
and
Keys:
Authentication:
Digital
Encryption:
Signatures:
Advantages of PGP:
DIGITAL ENCRYPTION
SIGNATURE
Advantages of S/MIME:
the Right
simpler options.
• Usability: The ease of use and management for both users and