1 Example security systems n Kerberos n Secure shell.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Chapter 10 Real world security protocols
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
KERBEROS LtCdr Samit Mehra (05IT 6018).
KERBEROS A NETWORK AUTHENTICATION PROTOCOL Nick Parker CS372 Computer Networks.
SCSC 455 Computer Security
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
World-Wide Web and Client-Server Authentication using Kerberos by Phoenix Malizia.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Kerberos Authenticating Over an Insecure Network.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
SSH Secure Login Connections over the Internet
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Kerberos  Kerberos was a 3-headed dog in Greek mythology Guarded the gates of the deadGuarded the gates of the dead Decided who might enterDecided who.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
1 SSH / SSL Supplementary material. 2 Secure Shell (SSH) One of the primary goals of the ARPANET was remote access Several different connections allowed.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Advanced Authentication Campus-Booster ID: Copyright © SUPINFO. All rights reserved Kerberos.
KERBEROS SYSTEM Kumar Madugula.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
SECURE SHELL MONIKA GUPTA COT 4810.
Radius, LDAP, Radius used in Authenticating Users
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Kerberos Part of project Athena (MIT).
KERBEROS.
Presentation transcript:

1 Example security systems n Kerberos n Secure shell

2 Kerberos n Kerberos is a network authentication system n developed at MIT in late eighties n features: u authenticates users on untrusted network. u clear password is never send over the network u single sign-on facility (user enters password only once) n uses DES (symmetric cryptosystem to encrypt messages n Kerberos server - key distribution server u has to be protected and physically secured, better no other apps on it u contains: F authentication database - contains user IDs and passwords (secret keys) for all users (and machines) in the system the server/user keys are distributed physically as part of installation F authentication server - verifies user’s identity at the time of login F ticket-granting server - supplies tickets to clients for permitting access to other servers in the system

3 Kerberos n client - runs on public workstations, obtains permission from Kerberos server for the user to access resources untrusted - user using the client must be authenticated before allowed to access resources n application server - provides certain service to client after authenticity of the client has been verified by the Kerberos server

4 Kerberos authentication protocol

5 Kerberos authentication protocol (cont.) n A - authentication server, G - ticket-granting server, C - client, S - application server C1 - ticket-granting ticket, C4 - service-granting ticket

6 Problems with Kerberos n Not effective against password guessing attacks n an application has to be Kerberized (modified to work with Kerberos) n after authentication the information is transmitted without encryption n users’ passwords are stored in unencrypted from on the Kerberos server n loose clock synchronization is necessary n appropriate time to live for tickets needs to be configured

7 Secure shell (SSH) n Ssh - authentication and encryption system n Originally developed at Helisinki University of Technology now maintained by SSH Communications Security, Ltd n features: u authentication of users on the untrusted network u clear passwords are never sent over the network u communication between machines is encrypted - multiple encryption algorithms available (the algorithms may be automatically selected) u communication may be (automatically) compressed u tunneling and encryption of arbitrary connections n client-server architecture: u ssh server (daemon) - handles authentication, encryption and compression u ssh client - handles communication on the client side

8 SSH communication n SSH uses both asymmetric (for authentication) and symmetric (for data encryption) cryptosystems. n Stage 1. connection negotiation: u Each machine running SSH has a (asymmetric) key-pair called host key. A server key-pair is generated when a client contacts the server u when a client contacts a server, the server sends server and host’s public keys. u client stores host’s public key between sessions. The client compares the host’s public key it receives with the one it stores to make sure the host is correct u client generates a random number to serve as session key. It encrypts this session key using both the host and server key and sends them to server u further communication is encrypted with session key using one of the symmetric data encryption methods, the communication can be optionally compressed

9 SSH communication (cont.) n Stage 2. user authentication: u multiple authentication methods can be used: F a server has a list of user x machine pairs from which it accepts connections without further authentication F a server possesses a list of pairs user’s pubic key x machine, the client has a private key and has to authenticate itself by providing a nonce encrypted with this private key F password authentication - server stores login x password of the client (or can verify it with a password server) n Stage 3. command execution: u after authentication a client requests a command to be executed on a server - may be a shell command