Unit-IV Modified
Unit-IV Modified
Kerberos
Kerberos4 is an authentication service
Kerberos provides a centralized authentication
server whose function is to authenticate users
to servers and servers to users.
Kerberos relies exclusively on symmetric
encryption
Two versions of Kerberos are in common use
Version 4
Version 5
A Simple Authentication Dialogue
A More Secure Authentication Dialogue
Problems
Number of times that a user has to enter a
password
Plaintext transmission of the password
Summary of Kerberos Version 4 Message
Exchanges
Overview of Kerberos
A full-service Kerberos environment consisting of a
Kerberos server, a number of clients, and a number of
application servers requires the following:
1. The Kerberos server must have the user ID and hashed
passwords of all participating users in its database. All
users are registered with the Kerberos server.
2. The Kerberos server must share a secret key with each
server. All servers are registered with the Kerberos server.
Such an environment is referred to as a Kerberos realm.
3.
The Kerberos server in each interoperating realm shares a
secret key with the server in the other realm. The two
Kerberos servers are registered with each other.
Kerberos Realms
Kerberos Version 5
developed in mid 1990’s
specified as Internet standard RFC 1510
provides improvements over v4
addresses environmental shortcomings
encryption alg, network protocol, byte order, ticket
lifetime, authentication forwarding, interrealm auth
and technical deficiencies
double encryption, non-std mode of use, session keys,
password attacks
. Environmental shortcomings
if the correct public key was used to decrypt the message digest
for authentication by comparing this plaintext copy of the first two
octets with the first two octets of the decrypted digest.
Key ID of sender’s public key: Identifies the public key that should be used
to decrypt the message digest
The session key component includes the session key and the
identifier of the recipient’s public key that was used by the sender to
encrypt the session key.
PGP Message Generation
PGP Message Generation
1. Signing the message:
a. PGP retrieves the sender’s private key from the private-
key ring using your_userid as an index. If your_userid was
not provided in the command, the first private key on the
ring is retrieved.
b. PGP prompts the user for the passphrase to recover the
unencrypted private key.
c. The signature component of the message is constructed.
2. Encrypting the message:
a. PGP generates a session key and encrypts the message.
b. PGP retrieves the recipient’s public key from the public-
key ring using her_userid as an index.
c. The session key component of the message is
constructed.
PGP Message Reception
PGP Message Reception
1. Decrypting the message:
a. PGP retrieves the receiver’s private key from the private-key
ring using the Key ID field in the session key component of the
message as an index.
b. PGP prompts the user for the passphrase to recover the
unencrypted private key.
c. PGP then recovers the session key and decrypts the
message.
2. Authenticating the message:
a. PGP retrieves the sender’s public key from the public-key
ring using the Key ID field in the signature key component of
the message as an index.
b. PGP recovers the transmitted message digest.
c. PGP computes the message digest for the received message
and compares it to the transmitted message digest to
authenticate.
MIME
Multipurpose Internet Mail Extensions (MIME)
is an Internet standard that extends the
format of email to support:
Text in character sets other than ASCII
Non-text attachments: audio, video, images,
application programs etc.
Message bodies with multiple parts
Header information in non-ASCII character sets
S/MIME
Secure/Multipurpose Internet Mail Extension (S/MIME) is a security
enhancement to the MIME Internet e-mail format standard based
on technology from RSA Data Security.
Multipurpose Internet Mail Extension (MIME is intended to address
some of the problems and limitations of the use of Simple Mail
Transfer Protocol (SMTP)
SMTP cannot transmit executable files or other binary objects.
SMTP cannot transmit text data that includes national language
characters
SMTP servers may reject mail message over a certain size.
SMTP gateways that translate between ASCII and the character
code EBCDIC do not use a consistent set of mappings, resulting
in translation problems.
SMTP gateways to X.400 electronic mail networks cannot handle
nontextual data included in X.400 messages.
Some SMTP implementations do not adhere completely to the
SMTP standards defined in RFC 821. Common problems include:
Deletion, addition, or reordering of carriage return and linefeed
Truncating or wrapping lines longer than 76 characters
S/MIME
The MIME specification includes the following
elements.
1. Five new message header fields are defined,
which may be included in an RFC 5322 header.
These fields provide information about the body
of the message.
2. A number of content formats are defined, thus
standardizing representations that support
multimedia electronic mail.
3. Transfer encodings are defined that enable the
conversion of any content format into a form
that is protected from alteration by the mail
system.
Header fields defined in MIME
MIME-Version: Must have the parameter value 1.0. This field
indicates that the message conforms to RFCs 2045 and 2046.
Content-Type: Describes the data contained in the body with
sufficient detail that the receiving user agent can pick an
appropriate agent or mechanism to represent the data to the
user or otherwise deal with the data in an appropriate
manner.
Content-Transfer-Encoding: Indicates the type of
transformation that has been used to represent the body of
the message in a way that is acceptable for mail transport.
Content-ID: Used to identify MIME entities uniquely in multiple
contexts.
Content-Description: A text description of the object with the
body; this is useful when the object is not readable (e.g.,
audio data).
MIME Content Types
MIME – Example cont’d
--unique-boundary-1
Content-type: text/enriched
--unique-boundary-1
Content-Type: message/rfc822
--unique-boundary-1--
/MIME / introduction
74