NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC) Figure 1 Message Authentication.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

NETWORK SECURITY.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Sir John Tenniel; Alice’s Adventures in Wonderland,Lewis Carroll 12-Jan-151 NTP Security Model David L. Mills University of Delaware
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CSCI 6962: Server-side Design and Programming
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
A Security Analysis of Network Time Protocol Andy Hospodor COEN /03/03 Paper by Matt Bishop, 1991.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 21 Distributed System Security Copyright © 2008.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptography CSS 329 Lecture 13:SSL.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Communication & Networks
Cryptography and Network Security
Tutorial on Creating Certificates SSH Kerberos
Dept. of Computer Science
NTP Security Algorithms
NTP Security Protocol David L. Mills University of Delaware
Survivable Real-Time Network Services
NTP Cryptographic Authentication (Autokey)
SSL (Secure Socket Layer)
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
OAuth Design Team Call 11th February 2013.
NTP Security Model David L. Mills University of Delaware
Autokey Version 2 Protocol Model and Implementation
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
NTP Security Protocol David L. Mills University of Delaware
NTP Security Algorithms
NTP Security Model David L. Mills University of Delaware
Presentation transcript:

NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC) Figure 1 Message Authentication

Source Address Key ID Dest Address Cookie Figure 2 NTPv4 Autokey

Session Key ID List Source Address Next Key ID Dest Address Compute Hash Final Key ID Final Index Index n Index n + 1 Key IDCookie Compute Signature Signature Figure 3 Consgtructing the Key List

Session Key ID List NTP Header and Extension Fields Message Authenticator Code (MAC) Key IDCompute Hash Figure 4 Transmittinig Messages

Alice Denise Alice Carol Brenda Alice Alice* Subject Group KeyIssuer Alice Alice* Carol Carol* Alice Alice* Brenda Alice Eileen Carol Carol* Brenda Denise Eileen Brenda Denise Carol Eileen Carol Alice Carol* AliceBrendaDeniseEileen Group KeyCertificate Stratum 1Stratum 2 Stratum 3 s s s = step * = trusted Figure 5 NTP Secure Groups

A S B X ZY R C D 2 Stratum Figure 6 Hierarchical Overlapping Groups

Carol Denise Alice Carol Brenda Alice Alice* Alice Alice* Carol Carol* Alice Alice* Brenda Alice Eileen Carol Carol* Brenda Denise Eileen Brenda Denise Carol Eileen Carol Carol* AliceBrendaDeniseEileen Stratum 1Stratum 2 Stratum 3 s Carol Figure 7 Multiple Overlapping Groups Subject Group KeyIssuer Group KeyCertificate s s s = step * = trusted

ClientServer Verify response and signature Challenge Response Challenge Request Send response and signature Compute nonce1 and send Compute nonce2 and response Figure 8 Autokey Exchange

Digest/Signature NIDIdentClient Host 2831 Figure 9 Status Word

StratPollLIModeVN Root Delay Root Dispersion Reference Identifier Reference Timestamp (64) Originate Timestamp (64) Receive Timestamp (64) Transmit Timestamp (64) Message Digest (128) Key/Algorithm Identifier Cryptosum Authenticator (Optional) Extension Field 1 (optional) Extension Field 2… (optional) Prec Figure 10 NTP Header Format

Padding (as needed) CodeLength Association ID Value Signature Length Signature Timestamp Filestamp Value Length Value Fields (optional) Figure 11 Extension Field Format ER VN

Trusted Authority Certificate Server Certificate Client Certificate Secure Figure 12 Private Certificate (PC) Identity Scheme

Host Subject Signature Issuer Host Subject Signature Issuer Trusted Host Subject Signature Subject … Figure 13 Trusted Certificate (TC) Identity Scheme

Trusted Authority Parameters Group Key Client Key Server Parameters Client Parameters Client Key SecureInsecure Response Challenge Group Key Figure 14 Schnorr (IFF) Identity Scheme

Trusted Authority Parameters Group Key Server Parameters Server Key Client Parameters Client Key Secure Response Challenge Group Key Figure 15 Guillou-Quisquater (GQ) Identity Scheme

Trusted Authority Parameters Group Key Server Key Client Key Server Parameters Server Key Client Parameters Client Key Secure Response Challenge Figure 16 Mu-Varadharajan (MV) Identity Scheme

NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC)

Client Address Cookie Server Address Compute Hash Cookie Private Value Key ID (0) Compute Signature Signature and Timestamp

Session Key ID List Source Address Next Key ID Dest Address Compute Hash Final Key ID Final Index Index n Index n + 1 Key IDCookie Compute Signature Signature

Session Key ID List NTP Header and Extension Fields Message Authenticator Code (MAC) Key IDCompute Hash