Presentation is loading. Please wait.

Presentation is loading. Please wait.

Distributed Authentication in Kerberos Using Public Key Cryptography

Similar presentations


Presentation on theme: "Distributed Authentication in Kerberos Using Public Key Cryptography"— Presentation transcript:

1 Distributed Authentication in Kerberos Using Public Key Cryptography
Marvin A. Sirbu John Chung-I Chuang Carnegie Mellon University Pittsburgh, Pennsylvania 15213 A Review By Benjamin Lai

2 Presentation Overview
Background The Proposed PKDA Protocol Conclusion

3 Background Kerberos is an authentication protocol
Features a separate Authentication Server (known as KDC – Key Distribution Centre) and Ticket Granting Service (TGS) KDC keeps a symmetric key for all principals in the realm Possible attack would be on the KDC for all symmetric keys – and the subsequent key-recovery is expensive

4 The PKDA Protocol - 1 Stands for “Public key based Kerberos for Distributed Authentication” Proposed to solve the security weaknesses of the KDC Certificate Authority (CA) replaces the KDC as the trusted intermediary Elimination of the KDC and TGS – the client authenticates directly with the application server

5 The PKDA Protocol - 2 Traditional Kerberos PKDA C  AS: AS_REQ
AS  C: AS_REP C  TGS: TGS_REQ TGS  C: TGS_REP C  S: AP_REQ Separate KDC and (possibly) TGS Security provided by short-lived nature of the Ticket Granting Ticket (TGT) PKDA C  S: SCERT_REQ S  C: SCERT_REP C  S: PKTGS_REQ S  C: PKTGS_REP C  S: AP_REQ Server now act as KDC as well as TGS Security provided by checking with the CA for revoked certificates

6 The PKDA Protocol - 3 K(random) is generated by the client
C  S: PKTGS_REQ Encrypted with Server’s Public Key - P(S) S C Auth – Time K(random) Auth – Data C C – Cert K(random) S P(S) Auth – Time Encrypted with Client’s Private Key K(random) is generated by the client Everything is encrypted (besides S) for security reasons Auth – Time is included to prevent replay attacks

7 Encrypted with K(random)
The PKDA Protocol - 4 S  C: PKTGS_REP Encrypted with K(random) Session Ticket (C,S) C S Key(C,S) Auth – Time S C Key(C,S) Auth – Time Encrypted with Key(S) Key(S) is symmetric key known only to the server to prevent the client from modifying the ticket Since K(random) is generated by the client, only he can extract the information from the response

8 Conclusion In Traditional Kerberos KDC poses a big security weakness
PKDA was proposed to eliminate such security weakness. “The solution to a problem is itself another problem.” What are the potential problems that are foreseeable in the PKDA authentication scheme?


Download ppt "Distributed Authentication in Kerberos Using Public Key Cryptography"

Similar presentations


Ads by Google