or call for office visit.

Slides:



Advertisements
Similar presentations
Chapter 10 Real world security protocols
Advertisements

Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
ECE454/CS594 Computer and Network Security
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Chapter 4 - Kerberos Network Security and Management Fall Dr. Faisal Kakar Office:
ECE-8813 / CS Prof. John A. Copeland fax Office:
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Computer and Network Security - Message Digests, Kerberos, PKI –
KERBEROS SYSTEM Kumar Madugula.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 9. Key management
Security Outline Encryption Algorithms Authentication Protocols
Kerberos 1.
Symmetric Cryptography
Advanced Computer Networks
Tutorial on Creating Certificates SSH Kerberos
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Computer Communication & Networks
Cryptography and Network Security
Secure Sockets Layer (SSL)
CMSC 414 Computer and Network Security Lecture 15
What is network security?
CS480 Cryptography and Information Security
Chapter 15 Key Management
Chapter 8 Network Security.
Authentication Protocol
Tutorial on Creating Certificates SSH Kerberos
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Message Security, User Authentication, and Key Management
Cryptography Basics and Symmetric Cryptography
Network Security Basics
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
9.2 SECURE CHANNELS Medisetty Swathy.
Chapter 8 Network Security.
Computer Security Distributed System Security
CS 378 Kerberos Vitaly Shmatikov.
Security.
Security Of Wireless Sensor Networks
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Protocol ap1.0: Alice says “I am Alice”
Kerberos Part of project Athena (MIT).
KERBEROS.
CDK: Chapter 7 TvS: Chapter 9
Security of Wireless Sensor Networks
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Network Security Chapter 8.
COEN 351 Authentication.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Public Key Cryptography
AIT 682: Network and Systems Security
Presentation transcript:

email or call for office visit. ECE-6612 http://www.csc.gatech.edu/copeland/jac/6612/ Prof. John A. Copeland john.copeland@ece.gatech.edu 404 894-5177 fax 404 894-0035 Office: Klaus Bldg 3362 email or call for office visit. Chapter 4a - Kerberos

Kerberos, v4 and v5 Provides a complete protocol for authentication and secure communications for hosts connected by a data communications network • Provides secure "tickets" to hosts that can be used to initiate a secure message exchange • Standard message formats for encrypted and signed messages, or signed plaintext messages • Formats for encoding expiration time, names, ... • Allows "read-only" slave KDC's (distributed KDCs) Wikipedia: “KDC” or http://www.zeroshell.org/kerberos/Kerberos-operation/ 2

Keberos uses Mediated Authentication ) Jack Bob Alice (with a Key Distribution Center, KDC ) Jack Bob Alice Kbob Kalice Mary Tom KDC Paul Dick Peter Jip Trudi Harry KDC has unique Secret Keys with all legitimate hosts. 3

After the 1st exchange with the KDC, Alice has a Bob has (human) Alice PC Key {Ka,{TGT;Kk}; logs on hashes Distribut. Shared Kak} to Alice's Ctr., KDC Secret Key Alice, password Alice wants (PC) to get a Bob,{TGT;Kk}, with KDC, generates Kab Ka, has Kak, Kbob DES Key, {time;Ka} Kbob Kalice>Kak (1) {Bob,Kab,Ticket -Bob; Ka} {time; Kab}, {Kab,Alice; Kbob} ="Ticket" {time + 1, Kab} After the 1st exchange with the KDC, Alice has a session key, Ka, and a "Ticket-Granting Ticket" that she can use to request "Tickets" from KDC (1) PC erases Alice's password and Kak from RAM (keeps session key Ka in RAM). No keys ever stored on disk (what about virtual memory?). (2)Time(stamp) is used as nonce (seconds after 1/1/1970) 4

The Keys of Kerberos 1. Password, Kalice - Only Alice knows it. Alice’s PC can hash what Alice types in Kak = Hash(Kalice) . KDC - also knows the hash, Kak. Uses Kak as key for encrypting TGT to Alice (not used after that). TGT contains the daily session key Ka for use with the Ticket Granting Server, TGS. Ka: Session Key (KDC gave to Alice) Now Alice’s PC, as well as TGS know it. Kab: Key for Alice & Bob - temporarily (daily) assigned by TGS Given to Alice by TGS - encrypted with Ka and also encrypted with Kb (Kkdc-Bob) inside a contact ticket. (Kb is Bob's daily session key from KDC) Alice gives Bob the Ticket from KDC which has it (Kab) encrypted with Kb (gotten by Bob from the TGS). 4. Kk: Key known only by KDC and TGS. Used to sign Ticket-Granting-Ticket for verification. Alice can only replay {TGT;Kk} back to TGS to get a contact ticket. 5

KDC 6

Slave KDC Slave KDC Master KDC Slave KDC Slave KDC Slave Realm KDC Version 5 Slave Host KDC Host Slave Host Host KDC Host Master Host KDC {db;Kmaster} Slave Host KDC Host Host Slave Host KDC Slave Host Realm KDC • Replicated KDCs (slaves) are read only. • Entire Host-KDC database is downloaded periodically 7

Alice wants to talk to Dorothy KDC (Hatter) KDC Lion (Lion) 1 2 Alice Dorothy 3 Realm Lion can also be a Realm "principal" in Wonderland Oz Wonderland (with the Queen's OK) Alice wants to talk to Dorothy 8

Cipher Block Chaining ( P PCBC) Plaintext Cipher Block Chaining ( P PCBC) m1 m2 m3 IV (+) (+) (+) E E E Key c1 c2 c3 The 1st 64-bit message segment is XOR'ed with an initial vector (IV). Each following message segment is XOR'ed with the preceding ciphertext and plaintext segments-for privacy & integrity . 9

Kerberos Message Integrity Check (Message Digest) MIC is Hash(<Ksession,message>) The Hash algorithm was never published (but source code can be obtained) It is based on a checksum algorithm designed by Juneman to use mod 2^31-1 (prime), but changed to use 2^63-1 (not prime). Cryptographers worry that it might be breakable, or reversible (to get Ksession). 10

Network Layer (IP) Addresses in Tickets Only 4 bytes available, so limited to Internet Protocol (Novel, IBM, Appletalk, IPv6... longer) Makes "spoofing" harder, IP address must be stolen from network as well as Ticket from Alice. Prevents delegation, giving the ticket to another host to represent you (which is allowed by Kerberos V5) 11

Why Study Kerberos v4 (Why doesn't everyone switch to v5) Kerberos V4 is working well in many systems Switching to V5 requires stopping the network and upgrading every host at once before restart Kerberos V5 is inefficient in some ways compared to V4 • Specified in ASN.1 (abstraction good and bad) • Example: 11 bytes required for 4-byte IP address. 12

Kerberos v5 Cryptographic Algorithms Kerberos v4 used Plaintext Cipher Block Chaining and modified Juneman hash Kerberos v5 can use a variety of encryptions (DES in practice) and hashes (MD4, MD5). Primary MIC (message integrity check) uses • { confounder + MD5(confounder & message)}K' • K' = Kalice-bob (+) F0F0F0F0F0F0F0F0 A more modern MIC that is not used is • MD5(Kalice-bob & message) 13

Password security Originally UNIX stored a hash of each User’s password in a globally readable account. This can be attacked by hashing all common words for a reverse lookup table. • Do not send in clear except over short secure channels (avoid using Telnet, FTP, http (for passwords), …) • Choose had to guess passwords, enforce. • Force changing passwords periodically Avoid keeping password in memory longer than necessary to generate the user's key. • • Send hash of (key+nonce) to KDC for authentication • Add salt before hashing passwords for pw database • Add realm name to password before hashing for pw db 14

Message Security and Integrity Only exchange messages with authenticated hosts Develop a session key and separate MIC key using initial password exchange Encrypt Diffie-Hellman exchanges to prevent Bucket Brigade (man-in-middle) attacks. Use MICs, especially with self-synchronizing encryptions that survive permuting message blocks (e.g., ECB) . Get "random" numbers from true sources Protect Master KDC Key and hashed-key database 15

Concepts Used in Kerberos Central Key Server (KDC) - n rather than n*(n-1)/2 sets of keys. Could enforce “Connection Policy.” Distributed KDCs (Slave KDCs) to prevent “Denial of Service” (DoS) Attack. Use of password hashes, for verifying password without storing password. “Dictionary Attack” - use of “salt” to improve security. Message hashes for “Message Integrity Check” (MIC). Authentication exchange - “nonce” to prevent “Replay Attack”. Standard block encryption algorithm (DES) with unique “cipher feedback.” Session keys to reduce exposure of primary keys. Version 4 to 5 upgrade difficult. Newer systems (SSL, PGP, SSH) negotiate to find the best common algorithms available to both. 16