Download presentation
Presentation is loading. Please wait.
Published byChristiana Bennett Modified over 9 years ago
1
NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC) Figure 1 Message Authentication
2
Source Address Key ID Dest Address Cookie Figure 2 NTPv4 Autokey
3
Session Key ID List Source Address Next Key ID Dest Address Compute Hash Final Key ID Final Index Index n Index n + 1 Key IDCookie Compute Signature Signature Figure 3 Consgtructing the Key List
4
Session Key ID List NTP Header and Extension Fields Message Authenticator Code (MAC) Key IDCompute Hash Figure 4 Transmittinig Messages
5
Alice Denise Alice Carol Brenda Alice Alice* Subject Group KeyIssuer Alice Alice* Carol Carol* Alice Alice* Brenda Alice Eileen Carol Carol* Brenda Denise Eileen Brenda Denise Carol Eileen Carol Alice Carol* AliceBrendaDeniseEileen Group KeyCertificate 1 3 1 3 11 33 3 1 2 4 22 2 44 Stratum 1Stratum 2 Stratum 3 s s s = step * = trusted Figure 5 NTP Secure Groups
6
A S B X ZY R C D 2 Stratum 1 3 4 Figure 6 Hierarchical Overlapping Groups
7
Carol Denise Alice Carol Brenda Alice Alice* Alice Alice* Carol Carol* Alice Alice* Brenda Alice Eileen Carol Carol* Brenda Denise Eileen Brenda Denise Carol Eileen Carol Carol* AliceBrendaDeniseEileen 1 3 1 3 11 33 3 1 2 4 22 2 44 Stratum 1Stratum 2 Stratum 3 s Carol Figure 7 Multiple Overlapping Groups Subject Group KeyIssuer Group KeyCertificate s s s = step * = trusted
8
ClientServer Verify response and signature Challenge Response Challenge Request Send response and signature Compute nonce1 and send Compute nonce2 and response Figure 8 Autokey Exchange
9
Digest/Signature NIDIdentClient 01624 Host 2831 Figure 9 Status Word
10
StratPollLIModeVN Root Delay Root Dispersion Reference Identifier Reference Timestamp (64) Originate Timestamp (64) Receive Timestamp (64) Transmit Timestamp (64) Message Digest (128) Key/Algorithm Identifier Cryptosum Authenticator (Optional) Extension Field 1 (optional) Extension Field 2… (optional) Prec Figure 10 NTP Header Format
11
Padding (as needed) CodeLength Association ID Value Signature Length Signature Timestamp Filestamp Value Length Value Fields (optional) Figure 11 Extension Field Format ER VN
12
Trusted Authority Certificate Server Certificate Client Certificate Secure Figure 12 Private Certificate (PC) Identity Scheme
13
Host Subject Signature Issuer Host Subject Signature Issuer Trusted Host Subject Signature Subject … Figure 13 Trusted Certificate (TC) Identity Scheme
14
Trusted Authority Parameters Group Key Client Key Server Parameters Client Parameters Client Key SecureInsecure Response Challenge Group Key Figure 14 Schnorr (IFF) Identity Scheme
15
Trusted Authority Parameters Group Key Server Parameters Server Key Client Parameters Client Key Secure Response Challenge Group Key Figure 15 Guillou-Quisquater (GQ) Identity Scheme
16
Trusted Authority Parameters Group Key Server Key Client Key Server Parameters Server Key Client Parameters Client Key Secure Response Challenge Figure 16 Mu-Varadharajan (MV) Identity Scheme
17
NTP Header and Extension Fields Message DigestKey IDCompute Hash Message DigestCompare Message Authenticator Code (MAC)
18
Client Address Cookie Server Address Compute Hash Cookie Private Value Key ID (0) Compute Signature Signature and Timestamp
19
Session Key ID List Source Address Next Key ID Dest Address Compute Hash Final Key ID Final Index Index n Index n + 1 Key IDCookie Compute Signature Signature
20
Session Key ID List NTP Header and Extension Fields Message Authenticator Code (MAC) Key IDCompute Hash
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.