31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates 2003700691 REYHAN AYDOĞAN.

Slides:



Advertisements
Similar presentations
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Advertisements

Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
IT 221: Introduction to Information Security Principles Lecture 8:Authentication Applications For Educational Purposes Only Revised: October 20, 2002.
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication Applications We cannot enter into alliance with neighbouring princes until we are acquainted with their designs. —The Art of War, Sun Tzu.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Kerberos versions 4 and 5 X.509 Authentication Service
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 815 Network Security Lecture 9 Digital Signatures & Authentication Applications Kerberos February 13, 2003.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Authentication Applications
Dr Alejandra Flores-Mosri Security applications Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Authentication applications
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Chapter 21 Distributed System Security Copyright © 2008.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Authentication 3: On The Internet. 2 Readings URL attacks
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Winter 2006Prof. R. Aviv: Kerberos1 Kerberos Authentication Systems.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
Authentication Applications
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Computer and Network Security
Cryptography and Network Security Chapter 14
Chapter 14. Authentication Applications
Chapter 14 – Authentication Applications
Cryptography and Network Security
KERBEROS.
CSCE 715: Network Systems Security
Authentication Applications
CSCE 715: Network Systems Security
Cryptography and Network Security Chapter 14
بسم الله الرحمن الرحيم فصل چهارم kerberos.
Cryptography and Network Security Chapter 14
KERBEROS Miah, Md. Saef Ullah.
Cryptography and Network Security Chapter 14
Kerberos and X.509 Fourth Edition by William Stallings
Cryptography and Network Security Chapter 14
Authentication Applications
Presentation transcript:

31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates REYHAN AYDOĞAN

31/03/2005Authentication Applications 2 Outline Introduction to KERBEROS How Kerberos works? Comparison between version 4 and 5 Certificates X.509 Directory Authentication Service Conclusion

31/03/2005Authentication Applications 3 Introduction to Kerberos An authentication service developed for Project Athena at MIT Provides – strong security on physically insecure network – a centralized authentication server which authenticates Users to servers Servers to users Relies on conventional encryption rather than public- key encryption

31/03/2005Authentication Applications 4 Why Kerberos is needed ? Problem: Not trusted workstation to identify their users correctly in an open distributed environment 3 Threats: – Pretending to be another user from the workstation – Sending request from the impersonated workstation – Replay attack to gain service or disrupt operations

31/03/2005Authentication Applications 5 Why Kerberos is needed ? Cont. Solution: – Building elaborate authentication protocols at each server – A centralized authentication server (Kerberos)

31/03/2005Authentication Applications 6 Requirements for KERBEROS Secure: – An opponent does not find it to be the weak link Reliable: – The system should be able to back up another Transparent: – An user should not be aware of authentication Scalable: – The system supports large number of clients and severs

31/03/2005Authentication Applications 7 Versions of KERBEROS Two versions are in common use – Version 4 is most widely used version – Version 4 uses of DES – Version 5 corrects some of the security deficiencies of Version 4 – Version 5 has been issued as a draft Internet Standard (RFC 1510)

31/03/2005Authentication Applications 8 Kerberos Version 4: Dialog 1- Simple 1- IDc + Pc+IDv 2- Ticket 3- IDc +Ticket Ticket=Ekv[IDc,ADc,IDv] kv=Secret Key between AS and V (Server) Pc=password of client

31/03/2005Authentication Applications 9 Kerberos Version 4 : Dialog 2-More Secure 1- IDc + IDtgs 2- EKc [TicketTGS] 3- TicketTGS+IDc+IDv 4-TicketV Once per user logon session Once per type of service ticketTGS=EKtgs[IDc,ADc, IDtgs,TS1,LifeTime1 ]

31/03/2005Authentication Applications 10 Kerberos Version 4 : Dialog 2 - More Secure Cont. 5- TicketV+ IDc Once per service session TicketV=EKv[IDc,ADc,IDv,Ts2,Lifetime2]

31/03/2005Authentication Applications 11 Kerberos: The Version 4 Authentication Dialog 1- IDc + IDtgs +TS1 2- EKc [Kc.tgs,IDtgs,Ts2, Lifetime2,TicketTGS] KERBEROS Once per user logon session ticketTGS=EKtgs [Kc.tgs, IDc,ADc,IDtgs,TS2, LifeTime2 ]

31/03/2005Authentication Applications 12 Kerberos: The Version 4 Authentication Dialog Cont. KERBEROS 3- TicketTGS + AuthenticatorC + IDv 4-EKc.tgs[ Kc.v,IDv,Ts4,Ticketv] Once per type of service ticketTGS=EKtgs [Kc.tgs,IDc,ADc,IDtgs, TS2, LifeTime2 ] AuthenticatorC=EKc.tgs[IDc,ADc,TS3] ticketV=EKV[Kc.v,IDc,ADc,IDv, TS4, LifeTime4 ]

31/03/2005Authentication Applications 13 Kerberos: The Version 4 Authentication Dialog Cont. 5- TicketV+ AuthenticatorC Once per service session TicketV=EKv [Kv.c, IDc, ADc, IDv, TS4, Lifetime4] AuthenticatorC=EKc.v [IDc,ADc,TS5] 6- EKc.v[TS5+1]

31/03/2005Authentication Applications 14 Overview of Kerberos: 1

31/03/2005Authentication Applications 15 Overview of Kerberos: 2

31/03/2005Authentication Applications 16 Overview of Kerberos: 3

31/03/2005Authentication Applications 17 Overview of Kerberos: 4

31/03/2005Authentication Applications 18 Tickets: Contains information which must be considered private to the user Allows user to use a service or to access TGS Reusable for a period of particular time Used for distribution of keys securely

31/03/2005Authentication Applications 19 Authenticators Proves the client’s identity Proves that user knows the session key Prevents replay attack Used only once and has a very short life time One authenticator is typically built per session of use of a service

31/03/2005Authentication Applications 20 Kerberos Realms A single administrative domain includes: – a Kerberos server – a number of clients, all registered with server – application servers, sharing keys with server What will happen when users in one realm need access to service from other realms?: – Kerberos provide inter-realm authentication

31/03/2005Authentication Applications 21 Inter-realm Authentication: Kerberos server in each realm shares a secret key with other realms. It requires – Kerberos server in one realm should trust the one in other realm to authenticate its users – The second also trusts the Kerberos server in the first realm Problem: N*(N-1)/2 secure key exchange

31/03/2005Authentication Applications 22 Request for Service in another realm: 1-Request ticket for local TGS 2-Ticket for local TGS 5-Request ticket for remote server 6-Ticket for remote server 3-Request ticket for remote TGS 4-Ticket for remote TGS 7-request for remote service

31/03/2005Authentication Applications 23 KERBEROS Version 5 versus Version4 Environmental shortcomings of Version 4: – Encryption system dependence: DES – Internet protocol dependence – Ticket lifetime – Authentication forwarding – Inter-realm authentication

31/03/2005Authentication Applications 24 KERBEROS Version 5 versus Version4 Technical deficiencies of Version 4: – Double encryption – Session Keys – Password attack

31/03/2005Authentication Applications 25 Realm – Indicates realm of the user Options Times – From: the desired start time for the ticket – Till: the requested expiration time – Rtime: requested renew-till time Nonce – A random value to assure the response is fresh New Elements in Kerberos Version 5

31/03/2005Authentication Applications 26 Kerberos Version 5 Message Exchange:1 To obtain ticket-granting ticket: (1)C  AS : Options || IDc || Realmc || IDtgs ||Times || Nonce1 (2) AS  C : Realmc || IDc || Ticket tgs || EKc [ Kc,tgs || IDtgs || Times || Nonce1 ||| Realm tgs ] Ticket tgs= EKtgs [ Flags || Kc,tgs || Realm c || IDc || ADc || Times]

31/03/2005Authentication Applications 27 Kerberos Version 5 Message Exchange:2 To obtain service-granting ticket : (3)C  TGS : Options || IDv || Times || Nonce2 || Ticket tgs ║ Authenticator c (4)TGS  C : Realmc || IDc || Ticket v || EK c,tgs [ Kc,v ║Times|| Nonce2 || IDv ║ Realm v] Ticket tgs= EKtgs [ Flags || Kc,tgs || Realm c || IDc || ADc || Times] Ticket v : EK v [Kc,,v ║ Realmc || IDc ║ ADc ║ Times ] Authenticator c : EK c,tgs [IDc ║ Realmc ║ TS1]

31/03/2005Authentication Applications 28 Kerberos Version 5 Message Exchange:3 To obtain service (5) C  S : Options || Ticket v|| Authenticator c (6) S  C : EK c,v [TS2|| Subkey || Seq# ] Ticket v : EK v [Flags || Kc,v || Realmc || IDc || ADc || Times ] Authenticator c : EK c,v [IDc || Realmc || TS2 || Subkey|| Seq# ]

31/03/2005Authentication Applications 29 Kerberos : Strengths User's passwords are never sent across the network, encrypted or in plain text Secret keys are only passed across the network in encrypted form Client and server systems mutually authenticate It limits the duration of their users' authentication. Authentications are reusable and durable Kerberos has been scrutinized by many of the top programmers, cryptologists and security experts in the industry

31/03/2005Authentication Applications 30 Certificate: Electronic counterparts to driver licenses, passports Verifies authenticity of the public key Prevents impersonation Enables individuals and organizations to secure business and personal transactions

31/03/2005Authentication Applications 31 What a certificate includes: Name of Entity being Certified Public Key Name of Certificate Authority Serial Number Expiration Date Digital signature of the issuer Other information (optional)

31/03/2005Authentication Applications 32 Certificate Authorities: Trusted entity which issue and manage certificates for a population of public-private key-pair holders. A digital certificate is issued by a CA and is signed with CA’s private key.

31/03/2005Authentication Applications 33 Who are the Certificate Authorities? VeriSign GTE CyberTrust Entrust IBM CertCo USPS / Cylink

31/03/2005Authentication Applications 34 Certificate Issuance Process: Generate public/private key pair Sends public key to CA Proves identity to CA - verify CA signs and issues certificate CA s certificate or Requestor retrieves certificate from secure websites Requestor uses certificate to demonstrate legitimacy of their public key

31/03/2005Authentication Applications 35 Types of Digital Certificates Certificates Browser Certificates Server (SSL) Certificates Software Signing Certificates

31/03/2005Authentication Applications 36 Potential security holes: Was the user really identified? Security of the private key Can the Certificate Authority be trusted? Names are not unique

31/03/2005Authentication Applications 37 X.509 Directory Authentication Service CCITT recommendation defining a directory service Defines a framework for the authentication services The X.500 directory serving as a repository of public-key certificates Defines alternative authentication protocols

31/03/2005Authentication Applications 38 X.509 Certificate format Version Serial number Algorithm Parameters Issuer Not before Not after Subject Algorithm Parameter Key Signature Algorithm identifier Period of validity Subject’s public key Notation to define a certificate: CA >=CA{V,SN,AI,CA,Ta,A,Ap} where Y >= the certificate of user X issued by certification authority Y Y{I}=the signing of I by Y. It consists of I with an enciphered hash code appended.

31/03/2005Authentication Applications 39 Securely Obtain a Public Key Scenario: – A has obtain a certificate from the CA X1 – B has obtain a certificate from the CA X2 – A can read the B’s certificate but cannot verify it. Solution: X1 X2 > – A obtain the certificate of X2 signed by X1 from directory.  obtain X2’s public key – A goes back to directory and obtain the certificate of B signed by X2.  obtain B’s public key securely

31/03/2005Authentication Applications 40 X.509 CA Hierarchy A acquires B certificate using chain: X >W >V > Y > Z > B acquires A certificate using chain: Z >Y >V > W > X >

31/03/2005Authentication Applications 41 Authentication Procedures: Three alternative authentication procedures: – One-Way Authentication – Two-Way Authentication – Three-Way Authentication All use public-key signatures

31/03/2005Authentication Applications 42 One-Way Authentication: 1 message ( A->B) used to establish – the identity of A and that message is from A – message was intended for B – integrity & originality of message A B 1-A {ta,ra,B,sgnData,KUb[Kab]} Ta-timestamp rA=nonce B =identity sgnData=signed with A’s private key

31/03/2005Authentication Applications 43 Two-Way Authentication 2 messages (A->B, B->A) which also establishes in addition: – the identity of B and that reply is from B – that reply is intended for A – integrity & originality of reply A B 1-A {ta,ra,B,sgnData,KUb[Kab]} 2-B {tb,rb,A,sgnData,KUa[Kab]}

31/03/2005Authentication Applications 44 Three-Way Authentication 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks A B 1- A {ta,ra,B,sgnData,KUb[Kab]} 2 -B {tb,rb,A,sgnData,KUa[Kab]} 3- A{rb}

31/03/2005Authentication Applications 45 Conclusion Kerberos is an authentication service using convention encryption Certificates is the proof of the identity X.509 defines alternative authentication protocols

31/03/2005Authentication Applications 46 THANKS FOR LISTENING ANY QUESTION?

31/03/2005Authentication Applications 47 REFERENCES: 1. Stallings, William, “Network and Internetwork Security Principles and Practice ”,Prentice Hall, New Jersey, orientation/ Kerberos.ppt 4. erts.html erts.html 5. ate/ ate/