Download presentation
Presentation is loading. Please wait.
Published byBarbra Goodman Modified over 9 years ago
2
Kerberos : An Authentication Service for Computer Networks B.Clifford Neuman and Theodore Ts’o IEEE Communication Magazine September 1994 Presented by: Jian-jun Dong “When using authentication based on cryptography, an attacker listening to the network gains no infor mation that would enable it to falsely claim another’s identity. Kerberos is an example of this type of authentication technology…”
3
Outline Introduction Basic Kerberos authentication protocol How Kerberos works Vulnerabilities I see in Kerberos Conclusion
4
Introduction In computer networks, data my be exposed to unauthorized access. So it is important to protect data from being accessed by an attacker. Encryption techniques are considered to be the most powerful protection to prevent unauthorized access to data. Kerberos is an example of authentication technology, which based on secret encryption keys.
5
C Customer Client Basic Kerberos authentication protocol AS: Authentication Server, distributes keys and tickets to Client AS (1) (2) (3) (4) V Services Server (1)as_req:c,v,time exp, n (2)as_rep:{Kc,v, v, timeexp,n,…}Kc, {Tc,v}Kv (3)ap_req:{ts,ck,Ksubsession,…}Kc,v {Tc,v}Kv (4)ap_rep:{ts}Kc,v (optional) Client: the entity want certain service from Server Server: the entity verifies Client’s identity and allow Client to access certain service
6
How Kerberos works Step 1 My name, and the name of the guy I want to know AS Client
7
How Kerberos works (continue) Step 2 AS Client TKT Client’s name, Address, validate time
8
How Kerberos works?(continue) Client TKT Client’s name, Address, validate time What I want Client’s name address Server Step 3
9
How Kerberos works(continue) Client Server server’s name address Step 4
10
Vulnerabilities I See in Kerberos AS holds too many keys, if he lost some keys or he is sick will result serious problem. When the client first time sends a box to AS, the box is not locked, if someone steal the key inside, this person will be able to impersonate the client. Question: Have you got any idea to solve these vulnerabilities?
11
Conclusion This article is a reasonably good tutorial for introducing the basic concept of Kerberos’ protocol. Kerberos is quite comprehensive, but is not perfect.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.