Presentation is loading. Please wait.

Presentation is loading. Please wait.

Kerberos : An Authentication Service for Computer Networks B.Clifford Neuman and Theodore Ts’o IEEE Communication Magazine September 1994 Presented by:

Similar presentations


Presentation on theme: "Kerberos : An Authentication Service for Computer Networks B.Clifford Neuman and Theodore Ts’o IEEE Communication Magazine September 1994 Presented by:"— Presentation transcript:

1

2 Kerberos : An Authentication Service for Computer Networks B.Clifford Neuman and Theodore Ts’o IEEE Communication Magazine September 1994 Presented by: Jian-jun Dong “When using authentication based on cryptography, an attacker listening to the network gains no infor mation that would enable it to falsely claim another’s identity. Kerberos is an example of this type of authentication technology…”

3 Outline  Introduction  Basic Kerberos authentication protocol  How Kerberos works  Vulnerabilities I see in Kerberos  Conclusion

4 Introduction  In computer networks, data my be exposed to unauthorized access. So it is important to protect data from being accessed by an attacker. Encryption techniques are considered to be the most powerful protection to prevent unauthorized access to data. Kerberos is an example of authentication technology, which based on secret encryption keys.

5 C Customer Client Basic Kerberos authentication protocol  AS: Authentication Server, distributes keys and tickets to Client AS (1) (2) (3) (4) V Services Server  (1)as_req:c,v,time exp, n  (2)as_rep:{Kc,v, v, timeexp,n,…}Kc, {Tc,v}Kv  (3)ap_req:{ts,ck,Ksubsession,…}Kc,v {Tc,v}Kv  (4)ap_rep:{ts}Kc,v (optional)  Client: the entity want certain service from Server  Server: the entity verifies Client’s identity and allow Client to access certain service

6 How Kerberos works Step 1 My name, and the name of the guy I want to know AS Client

7 How Kerberos works (continue) Step 2 AS Client TKT Client’s name, Address, validate time

8 How Kerberos works?(continue) Client TKT Client’s name, Address, validate time What I want Client’s name address Server Step 3

9 How Kerberos works(continue) Client Server server’s name address Step 4

10 Vulnerabilities I See in Kerberos  AS holds too many keys, if he lost some keys or he is sick will result serious problem.  When the client first time sends a box to AS, the box is not locked, if someone steal the key inside, this person will be able to impersonate the client. Question: Have you got any idea to solve these vulnerabilities?

11 Conclusion  This article is a reasonably good tutorial for introducing the basic concept of Kerberos’ protocol.  Kerberos is quite comprehensive, but is not perfect.


Download ppt "Kerberos : An Authentication Service for Computer Networks B.Clifford Neuman and Theodore Ts’o IEEE Communication Magazine September 1994 Presented by:"

Similar presentations


Ads by Google