ECE-8813 / CS 8803 Prof. John A. Copeland 404 894-5177 fax 404 894-0035 Office:

Slides:



Advertisements
Similar presentations
COEN 350 Kerberos.
Advertisements

Chapter 10 Real world security protocols
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
ECE454/CS594 Computer and Network Security
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Lecture 5: Cryptographic Hashes
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
COEN 350 Kerberos. Provide authentication for a user that works on a workstation. Uses secret key technology Because public key technology still had patent.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS470, A.SelcukKerberos1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Chapter 4 - Kerberos Network Security and Management Fall Dr. Faisal Kakar Office:
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Computer and Network Security - Message Digests, Kerberos, PKI –
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
KERBEROS SYSTEM Kumar Madugula.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
1 Example security systems n Kerberos n Secure shell.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Advanced Computer Networks
or call for office visit.
Message Security, User Authentication, and Key Management
Kerberos Part of project Athena (MIT).
AIT 682: Network and Systems Security
Presentation transcript:

ECE-8813 / CS Prof. John A. Copeland fax Office: GCATT Bldg 579 or call for office visit, or call Kathy Cheek, Chapter 4a - Kerberos

Kerberos, v4 and v5 Provides a complete protocol for authentication and secure communications for hosts connected by a data communications network Provides secure "tickets" to hosts that can be used to initiate a secure message exchange Standard message formats for encrypted and signed messages, or signed plaintext messages Formats for encoding expiration time, names,... Allows "read-only" slave KDC's (distributed KDCs) 2

Keberos uses Mediated Authentication (with a Key Distribution Center, KDC ) Jack Jip KDC Mary Paul Peter Harry Dick Tom Alice Bob Trudi KDC has unique Secret Keys with all legitimate hosts. K bob K alice 3

Bob has Shared Secret Key with KDC, K bob Alice {time, K ab },{K ab,Alice; K bob } ="Ticket" {time + 1, Kab} After the 1st exchange with the KDC, Alice has a session key, Ka, and a "Ticket-Granting Ticket" that she can use to request "Tickets" from KDC PC erases Alice's password and Kak from disk and RAM. Time(stamp) is used as nonce (seconds after 1/1/1970) Alice PC hashes Alice's passwork to get a DES Key, K alice= K a that KDC knows Key Dist. Ctr gen.s Kab Alice (human) logs on to Alice, (PC) {Ka,{TGT;K k }; Kak} Alice wants Bob,TGT, {time;Ka} {Bob,Kab,Ticket -Bob; Ka} 4 Kab: Session key for Alice and Bob (Alice gives to Bob)

5

Master KDC Slave KDC {db;Kmaster} Slave KDC Slave KDC Slave KDC Slave KDC Host Realm Replicated KDCs (slaves) are read only. Entire Host-KDC dasebase is downloaded periodically 6

Realm Wonderland KDC (Lion) Lion Lion can also be a "principal" in Wonderland (with the Queen's OK) Realm Oz KDC (Hatter) DorothyAlice Alice wants to talk to Dorothy 7

PlaintextCipher Block Chaining (PPCBC) m1m2m3 IV(+) EEEKey c1c2c3 The 1st 64-bit message segment is XOR'ed with an initial vector (IV). Each following message segment is XOR'ed with the preceding ciphertext and plaintext segments-for privacy & integrity. 8

Kerberos Message Integrity Check (Message Digest) MIC is Hash( ) The Hash algorithm was never published (but source code can be obtained) It is based on a checksum algorithm designed by Juneman to use mod 2^31-1 (prime), but changed to use 2^63-1 (not prime). Cryptographers worry that it might be breakable, or reversible (to get K session ). 9

Network Layer (IP) Addresses in Tickets Only 4 bytes available, so limited to Internet Protocol (Novel, IBM, Appletalk, IPv6... longer) Makes "spoofing" harder, IP address must be stolen from network as well as Ticket from Alice. Prevents delegation, giving the ticket to another host to represent you (which is allowed by Kerberos V5) 10

Why Study Kerberos v4 (Why doesn't everyone switch to v5) Kerberos V4 is working well in many systems Switching to V5 requires stopping the network and upgrading every host at once before restart Kerberos V5 is inefficient in some ways compared to V4 Specified in ASN.1 (abstraction good and bad) Example: 11 bytes required for 4-byte IP address. 11

Kerberos v5 Cryptographic Algorithms Kerberos v4 used Plaintext Cipher Block Chaining and modified Juneman hash Kerberos v5 can use a variety of encryptions (DES in practice) and hashes (MD4, MD5). One primary MIC uses { confounder + MD5(confounder & message)}K' K' = Kalice-bob (+) F0F0F0F0F0F0F0F0 A more modern MIC that is not used is MD5(Kalice-bob & message) 12

Password security Do not send in clear except over short secure channels Choose had to guess passwords, enforce. Force changing passwords periodically Avoid keeping password in memory longer than necessary to generate the user's master key (w KDC) Send hash of (key+nonce) to KDC for authentication Add salt before hashing passwords for pw database Add realm name to password before hashing for pw db Originally UNIX stored a hash of each User’s password in a globally readable account. This can be attacked by hashing all common words for a reverse lookup table. 13

Message Security and Integrity Only exchange messages with authenticated hosts Develop a session key and separate MIC key using initial password exchange Encrypt Diffie-Hellman exchanges to prevent Bucket Brigade (man-in-middle) attacks. Use MICs, especially with self-synchronizing encryptions (e.g., PCBC) which survive permutations of message blocks. Get "random" numbers from true sources Protect Master KDC Key and hashed-key database 14

Bonus Entropy of Data, H H = sum [i=1 to k] {P i * log 2 (1/P i )} (bits of information per symbol) Where: k = number of states (or symbols) P i = probability of the i’th state (n i /N) If the symbols are binary numbers with 8 bits: H = 8 -> complete disorder or randomness H some order (ASCII text, H = bits) 15

16