SlideShare a Scribd company logo
Key Distribution and
UserAuthentication
Overview

  •   Symmetric Key Distribution using Symmetric Encryption
        Kerberos


  •   Key Distribution using Asymmetric Encryption
        X.509 Certificates




                                                              2




Raja Khurram Shahzad
Symmetric Key Distribution

  •   Two parties must share same key
        Protected from the access of others
        Frequent key exchange to limit amount of data
         compromised


  •   Key can be exchanged
       1.   Physical delivery to B
       2.   A third party physically deliver it to A and B
       3.   Re-usage of old key to exchange new key
       4.   A & B both communicate securely with C, C delivers the key

        For option 1 & 2 require manual delivery

        For option 3 link encryption or end-to-end encryption, What if old key
         is compromised
                                                                                  3




Raja Khurram Shahzad
Symmetric Key Distribution

        For option 4 two kinds of keys are used
             – Session Key: One time key
             – Permanent Key: for distributing session key.

             – Necessary element, Key Distribution Center (KDC):
               determines which systems are allowed to communicate with each
               other.

             – Operation of KDC
                   • A wish to communicate B, transmits request to KDC.
                     Communication is encrypted using a master key
                   • KDC approves connection and creates one time session key.
                     Session key is encrypted with permanent keys of A & B and
                     delivered to A & B.
                   • A & B set up logical connection and uses session key.


        Most widely application to use this approach is KERBEROS
                                                                                 4




Raja Khurram Shahzad
Security Concerns

  •   Key concerns are confidentiality and timeliness

  •   To provide confidentiality must encrypt identification and session
      key info which requires the use of previously shared private or
      public keys

  •   Need timeliness to prevent replay attacks

  •   Provided by using      sequence         numbers     or   timestamps   or
      challenge/response




                                                                                 5



                              ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS




             In Greek mythology, a many headed dog,
              the guardian of the entrance of Hades
                                                      6



                         ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS


    •   Users wish to access services on servers.

    •   Three threats exist:
           User pretend to be another user.
           User alter the network address of a workstation.
           User eavesdrop on exchanges and use a replay attack.




                                                                   7



                                  ET2437 - Network Security
Raja Khurram Shahzad
KERBEROS

   •    Assumes a distributed client/server architecture

   •    Provides a centralized authentication server to authenticate
        users to servers and servers to users.

   •    Relies on conventional encryption, making no use of public-
        key encryption


   •    Two versions: version 4 and 5

   •    Version 4 makes use of DES



                                                                       8



                              ET2437 - Network Security
Raja Khurram Shahzad
Requirements for Kerberos

  •   Secure:
         Eavesdropper should not be able to obtain the necessary
          information to impersonate a user


  •   Reliable:
         Kerberos should employ a distributed server architecture, systems
          backing up each other


  •   Transparent:
         User should not be aware that authentication is taking place


  •   Scalable:
         The system should be capable of supporting large number of clients
          and servers

                                                                               9



                                  ET2437 - Network Security
Raja Khurram Shahzad
Overview of Kerberos

  •   AS = Authentication Server
  •   SS = Service Server
  •   TGS = Ticket-Granting Server
  •   TGT = Ticket Granting Ticket

  •   User Client-based Logon
        A user enters a username and password on the client machine.
        The client performs a one-way function (hash usually) on the entered
         password, and this becomes the secret key of the client/user.




                                                                                10




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Authentication
        The client sends a clear text message of the user ID to the AS
         requesting services on behalf of the user. (Note: Neither the secret
         key nor the password is sent to the AS.)
             – The AS generates the secret key by hashing the password of the
               user found at the database.



        The AS checks client rights in its database. If valid, the AS sends
         back the following two messages to the client:
             – Message A: Client/TGS Session Key encrypted using the secret key
               of the client/user.
             – Message B: Ticket-to Get-Ticket (which includes the client ID, client
               network address, ticket validity period, and the client/TGS session
               key) encrypted using the secret key of the TGS.


                                                                                       11




Raja Khurram Shahzad
Overview of Kerberos

        Client receives messages A and B, and decrypt message A to obtain
         the Client/TGS Session Key.
             – The session key is used for further communications with the TGS.
               (Note: The client cannot decrypt Message B, as it is encrypted using
               TGS's secret key.)




                                                                                      12




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Authorization
        When requesting services, the client sends the following two
         messages to the TGS:
             – Message C: Composed of the TGT from message B and the ID of the
               requested service.
             – Message D: Authenticator (which is composed of the client ID and the
               timestamp), encrypted using the Client/TGS Session Key.

        TGS retrieves message B out of message C. It decrypts message B
         using the TGS secret key to have "client/TGS session key". Using this
         key, the TGS decrypts message D (Authenticator) and sends the
         following two messages to the client:
             – Message E: Client-to-server ticket (which includes the client ID, client
               network address, validity period and Client/Server Session Key)
               encrypted using the service's secret key.
             – Message F: Client/server session key encrypted with the Client/TGS
               Session Key.
                                                                                          13




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Authorization
        For requesting services, the client sends the following two messages
         to the TGS:
             – Message C: Composed of the TGT from message B and the ID of the
               requested service.
             – Message D: Authenticator (which is composed of the client ID and
               the timestamp), encrypted using the Client/TGS Session Key.

        TGS retrieves message B out of message C.
             – It decrypts message B using the TGS secret key. This gives it the
               "client/TGS session key". Using this key, the TGS decrypts message
               D (Authenticator) and sends the following two messages to the client:
                   • Message E: Client-to-server ticket (which includes the client ID, client
                     network address, validity period and Client/Server Session Key)
                     encrypted using the service's secret key.
                   • Message F: Client/server session key encrypted with the Client/TGS
                     Session Key.
                                                                                                14




Raja Khurram Shahzad
Overview of Kerberos

  •   Client Service Request
        Client receives messages E and F from TGS.
        The client connects to the SS and sends the following two messages:
             – Message E from the previous step (the client-to-server ticket,
               encrypted using service's secret key).
             – Message G: a new Authenticator, which includes the client ID,
               timestamp and is encrypted using client/server session key.
        The SS decrypts the ticket using its own secret key to retrieve
         the Client/Server Session Key. Using the sessions key, SS
         decrypts the Authenticator and sends the following message to the
         client to confirm its true identity and willingness to serve the client:
             – Message H: the timestamp found in client's Authenticator plus 1,
               encrypted using the Client/Server Session Key.
        ƒ The client decrypts the confirmation using the Client/Server
         Session Key and checks whether the timestamp is correctly updated.
         If so, then the client can trust the server and can start issuing service
         requests to the server.
                                                                                     15
        The server provides the requested services to the client.

Raja Khurram Shahzad
Overview of Kerberos




                                                       16



                           ET2437 - Network Security
Raja Khurram Shahzad
Kerberos Version 4

   •    Terms:
          C = Client
          AS = authentication server
          V = server
          IDc = identifier of user on C
          IDv = identifier of V
          Pc = password of user on C
          ADc = network address of C
          Kv = secret encryption key shared by AS and V
          TS = timestamp
          || = concatenation




                                                            17



                                ET2437 - Network Security
Raja Khurram Shahzad
A Simple Authentication Dialogue


     (1) C  AS:                          IDc || Pc || IDv
     (2) AS  C:                      Ticket
     (3) C  V:                  IDc || Ticket

     •       Ticket = EKv[IDc || Pc || IDv]




                                                             18



                                 ET2437 - Network Security
Raja Khurram Shahzad
Remaining problems


  2. Number of times that a user has to enter a password

  4. Plain-text transmission of password




                                                           19



                            ET2437 - Network Security
Raja Khurram Shahzad
More secure Authentication Dialogue
Once per user logon session:
•     C  AS:          IDC || IDtgs
•     AS  C:          EKc [ Tickettgs ]



Once per type of service:
(3) C  TGS:           IDC || IDV ||Tickettgs

(4)     TGS  C:       TicketV



Once per service session:
(5) C  V:             IDC || TicketV


                                                             20



                                 ET2437 - Network Security
Raja Khurram Shahzad
Remaining problems



  3. The lifetime associated with the ticket-granting ticket

  5. Servers are not able to authenticate themselves




                                                               21



                             ET2437 - Network Security
Raja Khurram Shahzad
Version 4 Authentication Dialogue
Authentication Service Exhange: To obtain Ticket-Granting
   Ticket
•     C  AS:           IDc || IDtgs ||TS1
•     AS  C:           EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs]

Ticket-Granting Service Echange: To obtain Service-Granting
    Ticket
(3) C  TGS:            IDv ||Tickettgs ||Authenticatorc

(4)     TGS  C:        EKc [Kc,¨v|| IDv || TS4 || Ticketv]

Client/Server Authentication Exhange: To Obtain Service
(5) C  V:             Ticketv || Authenticatorc

(6) V  C:              EKc,v[TS5 +1]

                                                                                22



                                 ET2437 - Network Security
Raja Khurram Shahzad
Version 4 Authentication Dialogue

  •    Problems:
         Lifetime associated with the ticket-granting ticket
         If to short  repeatedly asked for password
         If to long  greater opportunity to replay


  •    The threat is that an opponent will steal the ticket and use it before
       it expires




                                                                                23



                                  ET2437 - Network Security
Raja Khurram Shahzad
Overview of Kerberos




                                                       24



                           ET2437 - Network Security
Raja Khurram Shahzad
Request for Service in Another Realm




                                                       25



                           ET2437 - Network Security
Raja Khurram Shahzad
Difference Between Version 4 and 5

 •   Encryption system dependence (V.4 DES)

 •   IP - Internet protocol dependence

 •   Message byte ordering

 •   Ticket lifetime

 •   Authentication forwarding

 •   Inter realm authentication


                                                          26



                              ET2437 - Network Security
Raja Khurram Shahzad
Kerberos - in practice
  •   Currently have two Kerberos versions:
         4 : restricted to a single realm
         5 : allows inter-realm authentication, in beta test

  •   Kerberos v5 is an Internet standard
  •   Specified in RFC1510, and used by many utilities

  •   To use Kerberos:
         need to have a Key Distribution Center (KDC) on your network
         need to have Kerberised applications running on all participating
          systems
         major problem - US export restrictions
         Kerberos cannot be directly distributed outside the US in source format
          (& binary versions must obscure crypto routine entry points and have
          no encryption)
         else crypto libraries must be re-implemented locally

                                                                                    27



                                   ET2437 - Network Security
Raja Khurram Shahzad
Key Distribution using Asymmetric Encryption

  •   Problem : The distribution of Public Keys
        What if a fake user imparsionate to be a legitimate user and distribute his
         keys
  •   Solution : Public-Key Certificates
        Consists of a public key + User ID of the key owner with whole block
         signed by a trusted third party
        Third party is a Certificate Authority (CA), trusted by user community
        User deliver public key to CA in a secure manner and obtain a certificate
        User publish the certificate
        Anyone needing this user’s public key can obtain the certificate and verify
         it by attached trusted signature

        X.509 Certificates



                                                                                       28




Raja Khurram Shahzad
Key Distribution using Asymmetric Encryption




                                                         29

                            Public-Key Certificate Use
Raja Khurram Shahzad
X.509 Certificates

  •   Standard for a Public Key Infrastructure (PKI)
        Set of hardware, software, people, policies and procedures needed to
         create, manage, store, distribute and revoke digital certificates based
         on asymmetric cryptography


  •   Distributed set of servers that maintains a database about users.

  •   Assumes a strict hierarchical system of certificate authorities (CAs)
      for issuing the certificates

  •   Each certificate contains the public key of a user and is signed with
      the private key of a CA.

  •   Is used in S/MIME, IP Security, SSL/TLS and SET.
                                                                                   30


  •   RSA is recommended to use.
Raja Khurram Shahzad
X.509 Certificates

  •   A certification authority issues a certificate binding a public key to
      a particular distinguished user
        A certificate authority or certification authority (CA) is an entity which
         issues digital certificates for use by other parties. It is an example of
         a trusted third party. There are many commercial CAs that charge for
         their services. Institutions and governments may have their own
         CAs, and there are free CAs.


  •   An organization's trusted root certificates can be distributed to all
      employees so that they can use the company PKI system

  •   X.509 also includes standards for certificate revocation list (CRL)
      implementations


                                                                                      31




Raja Khurram Shahzad
X.509 Certificates




                                                      32



                          ET2437 - Network Security
Raja Khurram Shahzad
X.509 Certificates




                                                      33



                          ET2437 - Network Security
Raja Khurram Shahzad
X.509 Formats




                                                    34



                        ET2437 - Network Security
Raja Khurram Shahzad
Obtaining a User’s Certificate

    •    Characteristics of certificates generated by CA:

           Any user with access to the public key of the CA can recover the
            user public key that was certified.

           No part other than the CA can modify the certificate without this
            being detected.




                                                                                35



                                  ET2437 - Network Security
Raja Khurram Shahzad
Revocation of Certificates

    •   Reasons for revocation:

           The users secret key is assumed to be compromised.
           The user is no longer certified by this CA.
           The CA’s certificate is assumed to be compromised.




                                                                 36



                                   ET2437 - Network Security
Raja Khurram Shahzad
37



                       ET2437 - Network Security
Raja Khurram Shahzad
Ad

More Related Content

What's hot (20)

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
Ajit Dadresa
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
Vidulatiwari
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
Ch14
Ch14Ch14
Ch14
Francis Alamina
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
Mohammed Adam
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
Chandrapal Badshah
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
Vidulatiwari
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
Mohammed Adam
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 

Viewers also liked (20)

key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography
CryptographyCryptography
Cryptography
Suhepi Saputri
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
Fuzzy Set | Statistics
Fuzzy Set | StatisticsFuzzy Set | Statistics
Fuzzy Set | Statistics
Transweb Global Inc
 
Digital signature
Digital signatureDigital signature
Digital signature
Evion Technologies
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
Federal Urdu University
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
Federal Urdu University
 
Key management
Key managementKey management
Key management
Brandon Byungyong Jo
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Hash functions
Hash functionsHash functions
Hash functions
sameezahur
 
Merkle Trees
Merkle TreesMerkle Trees
Merkle Trees
David Evans
 
Fuzzy Set
Fuzzy SetFuzzy Set
Fuzzy Set
Ehsan Hamzei
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka
 
Ch01
Ch01Ch01
Ch01
n C
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
Shafaan Khaliq Bhatti
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Hash functions
Hash functionsHash functions
Hash functions
sameezahur
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka
 
Ch01
Ch01Ch01
Ch01
n C
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Ad

Similar to Lecture 9 key distribution and user authentication (20)

BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
limsh
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
kerberos
kerberoskerberos
kerberos
sameer farooq
 
6. Kerberos.ppt
6. Kerberos.ppt6. Kerberos.ppt
6. Kerberos.ppt
Madhusatish1
 
Gunaspresentation1
Gunaspresentation1Gunaspresentation1
Gunaspresentation1
anchalaguna
 
user authentication in cryptography and network security.pptx
user authentication in cryptography and network security.pptxuser authentication in cryptography and network security.pptx
user authentication in cryptography and network security.pptx
Vivekananda Gn
 
Kerberos realms & multiple kerberi
Kerberos realms & multiple kerberiKerberos realms & multiple kerberi
Kerberos realms & multiple kerberi
Manas Nayak
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
Netwax Lab
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
DBNCOET
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
Shashwat Shriparv
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
Shashwat Shriparv
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Abhishek Kesharwani
 
Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos Presentation: Provides a centralized authentication server to authen...Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos Presentation: Provides a centralized authentication server to authen...
INDRANEEL MUKHOPADHYAY
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
Mayuri Patil
 
Kerberos
KerberosKerberos
Kerberos
Mohanasundaram Nattudurai
 
6.Kerberos_in symmetric key distribution.pptx
6.Kerberos_in symmetric key distribution.pptx6.Kerberos_in symmetric key distribution.pptx
6.Kerberos_in symmetric key distribution.pptx
MushfiqUlHaque6
 
Kerberos full with detailed explanation tkerberos.ppt
Kerberos full with detailed explanation tkerberos.pptKerberos full with detailed explanation tkerberos.ppt
Kerberos full with detailed explanation tkerberos.ppt
manikandancsesdm
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
Srinivas Devulapalli
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
limsh
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Gunaspresentation1
Gunaspresentation1Gunaspresentation1
Gunaspresentation1
anchalaguna
 
user authentication in cryptography and network security.pptx
user authentication in cryptography and network security.pptxuser authentication in cryptography and network security.pptx
user authentication in cryptography and network security.pptx
Vivekananda Gn
 
Kerberos realms & multiple kerberi
Kerberos realms & multiple kerberiKerberos realms & multiple kerberi
Kerberos realms & multiple kerberi
Manas Nayak
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
Netwax Lab
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
DBNCOET
 
Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos Presentation: Provides a centralized authentication server to authen...Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos Presentation: Provides a centralized authentication server to authen...
INDRANEEL MUKHOPADHYAY
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
Mayuri Patil
 
6.Kerberos_in symmetric key distribution.pptx
6.Kerberos_in symmetric key distribution.pptx6.Kerberos_in symmetric key distribution.pptx
6.Kerberos_in symmetric key distribution.pptx
MushfiqUlHaque6
 
Kerberos full with detailed explanation tkerberos.ppt
Kerberos full with detailed explanation tkerberos.pptKerberos full with detailed explanation tkerberos.ppt
Kerberos full with detailed explanation tkerberos.ppt
manikandancsesdm
 
Ad

More from rajakhurram (14)

Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificates
rajakhurram
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
rajakhurram
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
rajakhurram
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
rajakhurram
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
rajakhurram
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
rajakhurram
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
rajakhurram
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
rajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificates
rajakhurram
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
rajakhurram
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
rajakhurram
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
rajakhurram
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
rajakhurram
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
rajakhurram
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
rajakhurram
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
rajakhurram
 

Recently uploaded (20)

Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Raffi Khatchadourian
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
TrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
TrsLabs - AI Agents for All - Chatbots to Multi-Agents SystemsTrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
TrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
Trs Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...
Raffi Khatchadourian
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
TrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
TrsLabs - AI Agents for All - Chatbots to Multi-Agents SystemsTrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
TrsLabs - AI Agents for All - Chatbots to Multi-Agents Systems
Trs Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 

Lecture 9 key distribution and user authentication

  • 2. Overview • Symmetric Key Distribution using Symmetric Encryption  Kerberos • Key Distribution using Asymmetric Encryption  X.509 Certificates 2 Raja Khurram Shahzad
  • 3. Symmetric Key Distribution • Two parties must share same key  Protected from the access of others  Frequent key exchange to limit amount of data compromised • Key can be exchanged 1. Physical delivery to B 2. A third party physically deliver it to A and B 3. Re-usage of old key to exchange new key 4. A & B both communicate securely with C, C delivers the key  For option 1 & 2 require manual delivery  For option 3 link encryption or end-to-end encryption, What if old key is compromised 3 Raja Khurram Shahzad
  • 4. Symmetric Key Distribution  For option 4 two kinds of keys are used – Session Key: One time key – Permanent Key: for distributing session key. – Necessary element, Key Distribution Center (KDC): determines which systems are allowed to communicate with each other. – Operation of KDC • A wish to communicate B, transmits request to KDC. Communication is encrypted using a master key • KDC approves connection and creates one time session key. Session key is encrypted with permanent keys of A & B and delivered to A & B. • A & B set up logical connection and uses session key.  Most widely application to use this approach is KERBEROS 4 Raja Khurram Shahzad
  • 5. Security Concerns • Key concerns are confidentiality and timeliness • To provide confidentiality must encrypt identification and session key info which requires the use of previously shared private or public keys • Need timeliness to prevent replay attacks • Provided by using sequence numbers or timestamps or challenge/response 5 ET2437 - Network Security Raja Khurram Shahzad
  • 6. KERBEROS In Greek mythology, a many headed dog, the guardian of the entrance of Hades 6 ET2437 - Network Security Raja Khurram Shahzad
  • 7. KERBEROS • Users wish to access services on servers. • Three threats exist:  User pretend to be another user.  User alter the network address of a workstation.  User eavesdrop on exchanges and use a replay attack. 7 ET2437 - Network Security Raja Khurram Shahzad
  • 8. KERBEROS • Assumes a distributed client/server architecture • Provides a centralized authentication server to authenticate users to servers and servers to users. • Relies on conventional encryption, making no use of public- key encryption • Two versions: version 4 and 5 • Version 4 makes use of DES 8 ET2437 - Network Security Raja Khurram Shahzad
  • 9. Requirements for Kerberos • Secure:  Eavesdropper should not be able to obtain the necessary information to impersonate a user • Reliable:  Kerberos should employ a distributed server architecture, systems backing up each other • Transparent:  User should not be aware that authentication is taking place • Scalable:  The system should be capable of supporting large number of clients and servers 9 ET2437 - Network Security Raja Khurram Shahzad
  • 10. Overview of Kerberos • AS = Authentication Server • SS = Service Server • TGS = Ticket-Granting Server • TGT = Ticket Granting Ticket • User Client-based Logon  A user enters a username and password on the client machine.  The client performs a one-way function (hash usually) on the entered password, and this becomes the secret key of the client/user. 10 Raja Khurram Shahzad
  • 11. Overview of Kerberos • Client Authentication  The client sends a clear text message of the user ID to the AS requesting services on behalf of the user. (Note: Neither the secret key nor the password is sent to the AS.) – The AS generates the secret key by hashing the password of the user found at the database.  The AS checks client rights in its database. If valid, the AS sends back the following two messages to the client: – Message A: Client/TGS Session Key encrypted using the secret key of the client/user. – Message B: Ticket-to Get-Ticket (which includes the client ID, client network address, ticket validity period, and the client/TGS session key) encrypted using the secret key of the TGS. 11 Raja Khurram Shahzad
  • 12. Overview of Kerberos  Client receives messages A and B, and decrypt message A to obtain the Client/TGS Session Key. – The session key is used for further communications with the TGS. (Note: The client cannot decrypt Message B, as it is encrypted using TGS's secret key.) 12 Raja Khurram Shahzad
  • 13. Overview of Kerberos • Client Service Authorization  When requesting services, the client sends the following two messages to the TGS: – Message C: Composed of the TGT from message B and the ID of the requested service. – Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key.  TGS retrieves message B out of message C. It decrypts message B using the TGS secret key to have "client/TGS session key". Using this key, the TGS decrypts message D (Authenticator) and sends the following two messages to the client: – Message E: Client-to-server ticket (which includes the client ID, client network address, validity period and Client/Server Session Key) encrypted using the service's secret key. – Message F: Client/server session key encrypted with the Client/TGS Session Key. 13 Raja Khurram Shahzad
  • 14. Overview of Kerberos • Client Service Authorization  For requesting services, the client sends the following two messages to the TGS: – Message C: Composed of the TGT from message B and the ID of the requested service. – Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key.  TGS retrieves message B out of message C. – It decrypts message B using the TGS secret key. This gives it the "client/TGS session key". Using this key, the TGS decrypts message D (Authenticator) and sends the following two messages to the client: • Message E: Client-to-server ticket (which includes the client ID, client network address, validity period and Client/Server Session Key) encrypted using the service's secret key. • Message F: Client/server session key encrypted with the Client/TGS Session Key. 14 Raja Khurram Shahzad
  • 15. Overview of Kerberos • Client Service Request  Client receives messages E and F from TGS.  The client connects to the SS and sends the following two messages: – Message E from the previous step (the client-to-server ticket, encrypted using service's secret key). – Message G: a new Authenticator, which includes the client ID, timestamp and is encrypted using client/server session key.  The SS decrypts the ticket using its own secret key to retrieve the Client/Server Session Key. Using the sessions key, SS decrypts the Authenticator and sends the following message to the client to confirm its true identity and willingness to serve the client: – Message H: the timestamp found in client's Authenticator plus 1, encrypted using the Client/Server Session Key.  ƒ The client decrypts the confirmation using the Client/Server Session Key and checks whether the timestamp is correctly updated. If so, then the client can trust the server and can start issuing service requests to the server. 15  The server provides the requested services to the client. Raja Khurram Shahzad
  • 16. Overview of Kerberos 16 ET2437 - Network Security Raja Khurram Shahzad
  • 17. Kerberos Version 4 • Terms:  C = Client  AS = authentication server  V = server  IDc = identifier of user on C  IDv = identifier of V  Pc = password of user on C  ADc = network address of C  Kv = secret encryption key shared by AS and V  TS = timestamp  || = concatenation 17 ET2437 - Network Security Raja Khurram Shahzad
  • 18. A Simple Authentication Dialogue (1) C  AS: IDc || Pc || IDv (2) AS  C: Ticket (3) C  V: IDc || Ticket • Ticket = EKv[IDc || Pc || IDv] 18 ET2437 - Network Security Raja Khurram Shahzad
  • 19. Remaining problems 2. Number of times that a user has to enter a password 4. Plain-text transmission of password 19 ET2437 - Network Security Raja Khurram Shahzad
  • 20. More secure Authentication Dialogue Once per user logon session: • C  AS: IDC || IDtgs • AS  C: EKc [ Tickettgs ] Once per type of service: (3) C  TGS: IDC || IDV ||Tickettgs (4) TGS  C: TicketV Once per service session: (5) C  V: IDC || TicketV 20 ET2437 - Network Security Raja Khurram Shahzad
  • 21. Remaining problems 3. The lifetime associated with the ticket-granting ticket 5. Servers are not able to authenticate themselves 21 ET2437 - Network Security Raja Khurram Shahzad
  • 22. Version 4 Authentication Dialogue Authentication Service Exhange: To obtain Ticket-Granting Ticket • C  AS: IDc || IDtgs ||TS1 • AS  C: EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs] Ticket-Granting Service Echange: To obtain Service-Granting Ticket (3) C  TGS: IDv ||Tickettgs ||Authenticatorc (4) TGS  C: EKc [Kc,¨v|| IDv || TS4 || Ticketv] Client/Server Authentication Exhange: To Obtain Service (5) C  V: Ticketv || Authenticatorc (6) V  C: EKc,v[TS5 +1] 22 ET2437 - Network Security Raja Khurram Shahzad
  • 23. Version 4 Authentication Dialogue • Problems:  Lifetime associated with the ticket-granting ticket  If to short  repeatedly asked for password  If to long  greater opportunity to replay • The threat is that an opponent will steal the ticket and use it before it expires 23 ET2437 - Network Security Raja Khurram Shahzad
  • 24. Overview of Kerberos 24 ET2437 - Network Security Raja Khurram Shahzad
  • 25. Request for Service in Another Realm 25 ET2437 - Network Security Raja Khurram Shahzad
  • 26. Difference Between Version 4 and 5 • Encryption system dependence (V.4 DES) • IP - Internet protocol dependence • Message byte ordering • Ticket lifetime • Authentication forwarding • Inter realm authentication 26 ET2437 - Network Security Raja Khurram Shahzad
  • 27. Kerberos - in practice • Currently have two Kerberos versions:  4 : restricted to a single realm  5 : allows inter-realm authentication, in beta test • Kerberos v5 is an Internet standard • Specified in RFC1510, and used by many utilities • To use Kerberos:  need to have a Key Distribution Center (KDC) on your network  need to have Kerberised applications running on all participating systems  major problem - US export restrictions  Kerberos cannot be directly distributed outside the US in source format (& binary versions must obscure crypto routine entry points and have no encryption)  else crypto libraries must be re-implemented locally 27 ET2437 - Network Security Raja Khurram Shahzad
  • 28. Key Distribution using Asymmetric Encryption • Problem : The distribution of Public Keys  What if a fake user imparsionate to be a legitimate user and distribute his keys • Solution : Public-Key Certificates  Consists of a public key + User ID of the key owner with whole block signed by a trusted third party  Third party is a Certificate Authority (CA), trusted by user community  User deliver public key to CA in a secure manner and obtain a certificate  User publish the certificate  Anyone needing this user’s public key can obtain the certificate and verify it by attached trusted signature  X.509 Certificates 28 Raja Khurram Shahzad
  • 29. Key Distribution using Asymmetric Encryption 29 Public-Key Certificate Use Raja Khurram Shahzad
  • 30. X.509 Certificates • Standard for a Public Key Infrastructure (PKI)  Set of hardware, software, people, policies and procedures needed to create, manage, store, distribute and revoke digital certificates based on asymmetric cryptography • Distributed set of servers that maintains a database about users. • Assumes a strict hierarchical system of certificate authorities (CAs) for issuing the certificates • Each certificate contains the public key of a user and is signed with the private key of a CA. • Is used in S/MIME, IP Security, SSL/TLS and SET. 30 • RSA is recommended to use. Raja Khurram Shahzad
  • 31. X.509 Certificates • A certification authority issues a certificate binding a public key to a particular distinguished user  A certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. There are many commercial CAs that charge for their services. Institutions and governments may have their own CAs, and there are free CAs. • An organization's trusted root certificates can be distributed to all employees so that they can use the company PKI system • X.509 also includes standards for certificate revocation list (CRL) implementations 31 Raja Khurram Shahzad
  • 32. X.509 Certificates 32 ET2437 - Network Security Raja Khurram Shahzad
  • 33. X.509 Certificates 33 ET2437 - Network Security Raja Khurram Shahzad
  • 34. X.509 Formats 34 ET2437 - Network Security Raja Khurram Shahzad
  • 35. Obtaining a User’s Certificate • Characteristics of certificates generated by CA:  Any user with access to the public key of the CA can recover the user public key that was certified.  No part other than the CA can modify the certificate without this being detected. 35 ET2437 - Network Security Raja Khurram Shahzad
  • 36. Revocation of Certificates • Reasons for revocation:  The users secret key is assumed to be compromised.  The user is no longer certified by this CA.  The CA’s certificate is assumed to be compromised. 36 ET2437 - Network Security Raja Khurram Shahzad
  • 37. 37 ET2437 - Network Security Raja Khurram Shahzad