AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
The Authentication Service ‘Kerberos’ and It’s Limitations
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
Chapter 14 – Authentication Applications
NETWORK SECURITY.
Kerberos and X.509 Fourth Edition by William Stallings
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
Authentication Applications The Kerberos Protocol Standard
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication Applications We cannot enter into alliance with neighbouring princes until we are acquainted with their designs. —The Art of War, Sun Tzu.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Kerberos versions 4 and 5 X.509 Authentication Service
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Henric Johnson1 Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
Authentication Applications
Dr Alejandra Flores-Mosri Security applications Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Authentication applications
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Network Security Essentials Chapter 4 Fourth Edition by William Stallings (Based on lecture slides by Lawrie Brown.
Authentication 3: On The Internet. 2 Readings URL attacks
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
31/03/2005Authentication Applications 1 Authentication Applications: Kerberos, X.509 and Certificates REYHAN AYDOĞAN.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Authentication Applications
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
KERBEROS SYSTEM Kumar Madugula.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
Cryptography and Network Security Chapter 14
Chapter 14. Authentication Applications
Chapter 14 – Authentication Applications
Cryptography and Network Security
CSCE 715: Network Systems Security
Authentication Applications
Authentication Protocol
CS 378 Kerberos Vitaly Shmatikov.
Cryptography and Network Security Chapter 14
Kerberos and X.509 Fourth Edition by William Stallings
Authentication Applications
Presentation transcript:

AUTHENTICATION APPLICATIONS - Chapter 14 Kerberos X.509 Directory Authentication (S/MIME)

SERVER ATTACKS B[A] : Pretend B  A: Impersonate B(A  Server): Eavesdrop/Replay Server W/station Server W/station

CENTRALISED AUTHENTICATION Symmetric Key - YES Public Key - NO Central Auth. K W/stationServerW/station

KERBEROS Two Versions Version 4. Version 5. – Draft Internet Standard

KERBEROS Secure no eavesdropper / user impersonation Reliable backup / critical Transparent user unaware / password Scalable large number of clients

KERBEROS Trusted Third-Party Authentication Uses Needham/Schroeder scheme Fig 7.9

KERBEROS V4 Uses DES Complicated! To analyse: Simple More Secure V4 Auth. Dialogue  Dialogue  Dialogue

SIMPLE DIALOGUE Impersonations: Server Confirms Client ID Authentication Server (AS) contains User Passwords (centralised) Unique Server Keys

SIMPLE DIALOGUE 1. C  ID C || P C || ID V AS 2. AS  Ticket C 3. C  ID C || Ticket V Ticket = E K V [ ID C || AD C || ID V ] C : client AS : authentication server V : server AD C : client address (ticket only valid if from C) P C : client password

MORE SECURE DIALOGUE Re-usable Tickets? But different tickets for every server Solution: Use Ticket Granting Server (TGS)

MORE SECURE DIALOGUE Once/Logon 1. C  ID C || ID TGS AS 2. AS  E K C [Ticket TGS ] C (K C from users password) Once/Service 3. C  ID C || ID V || Ticket TGS TGS 4. TGS  Ticket V C Once/Service Session 5. C  ID C || Ticket V V Ticket TGS = E K TGS [ID C || AD C || ID TGS || TS 1 || lifetime 1 ] Ticket V = E K V [ID C || AD C || ID V || TS 2 || lifetime 2 ]

ADVANTGAGES of MORE SECURE DIALOGUE Password NOT plaintext instead, pwd confirmed via K C Uses Multiple Service-Granting Tickets One Problem: Ticket TGS could be captured Solution: Ticket TGS includes timestamp T S and lifetime

MORE SECURE DIALOGUE WEAKNESSES 1. Short lifetime  too many password requests Long lifetime  replay attacks 2. False servers

VERSION 4. AUTHENTICATION DIALOGUE Table 14.1 – Protocol Table 14.2 – Rationale 1. Protect from Captured Tickets: AS  key Client Client  key TGS  key TGS prove ID key is K c, TGS

VERSION 4. Note: (1) TS 1 (2) TS 2, lifetime 2 (3) Authenticator – use once – short life (authenticates ticket sender as owner) After complete dialogue, Client : Server share secret key

KERBEROS SERVER REQUIRES User IDs Hashed Passwords Symmetric Server Keys (registered servers)

KERBEROS OVERVIEW

INTER-REALM AUTHENTICATION Two realms share secret key (mutually registered) - needs mutual trust (Fig 14.2) Problem: Does not scale well to many realms N realms  N(N-1) secure key 2 exhanges

INTER-REALM AUTHENTICATION

KERBEROS 4 PROBLEMS, KERBEROS 5 SOLUTIONS 1.Encryption System Dependence V4: (DES,export) V5: Ciphertext tagged with encryption id - keys tagged with type/length 2. Internet Protocol Dependence V4: requires IP addresses V5: addresses tagged with type/length (IP/ISO) 3. Message Byte Ordering V4: tagged message with ordering V5: Abstract Syntax Notation One Basis Encoding Rules

KERBEROS 4 PROBLEMS, KERBEROS 5 SOLUTIONS 4. Ticket Lifetime V4: 8-bit, 5 minute units, Max = 1280 minutes V5: Start time/End time – arbitrary 5. Authentication Forwarding V4: NO Credential Forwarding V5: Credential Forwarding 6. Inter-Realm Authentication V4: O(N 2 ) keys V5: Fewer keys

KERBEROS 4 PROBLEMS, KERBEROS 5 SOLUTIONS (Tech) 1.Double Encryption ((2), (4) of Table 14.1) V4: Yes V5: Second encryption omitted 2. PCBC Encryption V4: Nonstandard DES mode, PCBC (vulnerable), for integrity check V5: Explicit, separate integrity + CBC mode 3. Session Keys V4: Replay risk using repeated ticket V5: Subsession key. Once only

KERBEROS 4 PROBLEMS, KERBEROS 5 SOLUTIONS (tech) 4. Password Attacks V4: Vulnerable Key password  Decrypt by guessing passwords V5: Vulnerable Pre-authentication makes attacks more difficult

KERBEROS 5 AUTHENTICATION DIALOGUE Compare Tables 14.1 and 14.3 (1),(3) new: Realm, Options (flags), Times, Nonce Times are client requests for ticket time settings (5) new: Optional Mutual Authentication (6) new: No timestamp needed - use keys instead

X.509 AUTHENTICATION Directory – database : network adddress, certificate,…etc Certificate: CA = E KR auth [T,ID A,KU A ] (RSA recommended) Used for S/MIME, IPSec, SSL/TLS, and SET

CERTIFICATE DIRECTORY CA or user  (trusted) Directory Certificate Fig 14.3a - formats Certificates unforgeable Directory of certificates used to distribute authentic user public keys

CERTIFICATE DIRECTORY

TWO CAs A B Cert X 2 Cert B E KR 1 [T,ID 1,KU 2 ] E KR 2 [T,ID B,KU B ] CA 2 (KU 2 ) CA 1 (KU 1 )  X 1 >X 2 > A wishes to obtain B’s public securely via two accesses to the directory. A initially has cert. from X 1 B initially has cert. from X 2 Having X 1 ’s pub. key gives access to X 2 ’s pub. key Having X 2 ’s pub. key gives access to B’s pub. key

X.509 CA HIERARCHY

CHAIN OF CERTIFICATES Hierarchy : Fig 14.4 Forward Certificates : e.g. W > cert of X generated by W Reverse Certificates : e.g. X > cert of W generated by X e.g. X >W >V>>Y>>Y >Z > result: A recovers B’s public key

CERTIFICATE REVOCATION 1.User secret key compromised 2. User no longer certified 3. CA’s certificate compromised each CA has Certificate Revocation List (CRL)

X.509 AUTHENTICATION Three alternatives : a) One-Way Auth. – ID A, message from A, message is for B, integrity/originality of message b) Two-Way Auth. – a) plus ID B, reply from B, integrity/originality of reply c) Three-Way Auth. – b) plus signed nonce – to avoid t/stamps - used when clocks not synchronised

X.509 AUTHENTICATION

ENCRYPTION KEY FROM PASSWORD

PCBC MODE