SlideShare a Scribd company logo
Authentication Services
• Kerberos – A Private-key Authentication
Service
• X.509 directory authentication service
Threats in a distributed
environment
• Distributed computing model, client/server
• A user gains access to a WS, and pretend
to be another
• A user alters the network address of a WS
to impersonate another WS
• A user eavesdrops and uses a replay to
gain entrance or disrupt operations
Kerberos
• Trusted key server system from MIT
• Provides centralised private-key third-party
authentication in a distributed network
– Allows users access to services distributed
through network
– Without needing to trust all workstations
– Rather all trust a central authentication server
– Efficiency
• Two versions in use: 4 & 5
Kerberos Requirements
• First published report identified its
requirements as:
– security
– reliability
– transparency
– scalability
• Implemented using an authentication
protocol based on Needham-Schroeder
• A pure private-key scheme
A 3-step improvements leading to
Kerberos V4
• A simple authentication dialogue
– Has to enter password for each server
– Plaintext transmission of password
• AS+TGS model
– Enter the password once for multiple services
– Difficulty in choosing lifetime
• V4 model
– Use private session keys
– Can also verify server
– AS is the KDC for (C, TGS)
– TGS is the KDC for (C, V)
I. A Simple Authentication Dialogue
6. Kerberos.ppt
Analysis of Simple Authentication
Dialogue
• The Ticket is encrypted to prevent alteration or
forgery.
• The Server ID is included in the Ticket so that the
server can verify that it has decrypted the correct
ticket.
• By including the network address ADc masquerade
is not possible
Limitations
– Has to enter password for each server egs:Mail
server, File server, Print Server
– Plaintext transmission of password-Eavesdropper
to capture password
II. A More Secure Authentication
Dialogue
6. Kerberos.ppt
Analysis of More Secure Authentication
Dialogue
Limitations
• An opponent could eavesdrop on the network and
capture a copy of the ticket-granting ticket and then
wait for the legitimate user to log out. Then the
opponent could forge the legitimate user's network
address and files available to the Legitimate user
• Opponent captures a service-granting ticket and
uses it before it expires, the opponent has access to
the corresponding service
• Servers to authenticate themselves to users.
Otherwise false server would then be in a position to
act as a real server and capture any information from
the user and deny the true service to the user.
Additional Requirements:
• A network service (the TGS or an application
service) mustbe able to prove that the person
using a ticket is the same person to whom
that ticket was issued.
• Servers to authenticate themselves to users..
Kerberos 4 Overview
• A basic third-party authentication scheme
• Have an Authentication Server (AS)
– users initially negotiate with AS to identify self
– AS provides a authentication credential (ticket
granting ticket TGT)
• Have a Ticket Granting server (TGS)
– users subsequently request access to other
services from TGS on basis of users TGT
6. Kerberos.ppt
Kerberos 4 Overview
Kerberos Realms
• a Kerberos environment consists of:
– a Kerberos server
– a number of clients, all registered with server
– application servers, sharing keys with server
• this is termed a realm
– typically a single administrative domain
• Inter-realm authentication possible
– Mutual trust required
6. Kerberos.ppt
X.509 Version 3
• has been recognised that additional
information is needed in a certificate
– email/URL, policy details, usage constraints
• rather than explicitly naming new fields
defined a general extension method
• extensions consist of:
– extension identifier
– criticality indicator
– extension value
Certificate Extensions
• key and policy information
– convey info about subject & issuer keys, plus
indicators of certificate policy
• certificate subject and issuer attributes
– support alternative names, in alternative
formats for certificate subject and/or issuer
• certificate path constraints
– allow constraints on use of certificates by
other CA’s
6. Kerberos.ppt

More Related Content

PPT
Kerberos
PPT
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol
PDF
BAIT1103 Chapter 3
PPT
Authentication Application in Network Security NS4
PDF
Computer security module 4
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Kerberos Protocol
PPTX
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
Kerberos
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol
BAIT1103 Chapter 3
Authentication Application in Network Security NS4
Computer security module 4
CRYPTOGRAPHY AND NETWORK SECURITY
Kerberos Protocol
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...

Similar to 6. Kerberos.ppt (20)

PPTX
1. Kerberos is an auth protocol llllllllllllllllllllll
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Kerberos
PDF
An Introduction to Kerberos
PPT
Kerberos full with detailed explanation tkerberos.ppt
PPT
Gunaspresentation1
PDF
module1 network security.pdf
PDF
Presentation of Kerberos as per ECE scheme
PPTX
Rakesh raj
PPTX
1165839977.pptx
PPTX
6.Kerberos_in symmetric key distribution.pptx
PPTX
user authentication in cryptography and network security.pptx
PPT
Lecture 9 key distribution and user authentication
DOCX
Elliptic curve cryptography
PPT
Kerberos Presentation: Provides a centralized authentication server to authen...
PPTX
PPT
ok_mary_pki1234public_key_encryption.ppt
PPTX
Kerberos
PPT
Authentication: keys, MAC
PPT
Introduction to distributed security concepts and public key infrastructure m...
1. Kerberos is an auth protocol llllllllllllllllllllll
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kerberos
An Introduction to Kerberos
Kerberos full with detailed explanation tkerberos.ppt
Gunaspresentation1
module1 network security.pdf
Presentation of Kerberos as per ECE scheme
Rakesh raj
1165839977.pptx
6.Kerberos_in symmetric key distribution.pptx
user authentication in cryptography and network security.pptx
Lecture 9 key distribution and user authentication
Elliptic curve cryptography
Kerberos Presentation: Provides a centralized authentication server to authen...
ok_mary_pki1234public_key_encryption.ppt
Kerberos
Authentication: keys, MAC
Introduction to distributed security concepts and public key infrastructure m...
Ad

Recently uploaded (20)

PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Funds Management Learning Material for Beg
PDF
Exploring VPS Hosting Trends for SMBs in 2025
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Internet Safety for Seniors presentation
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPT
Ethics in Information System - Management Information System
PDF
The Evolution of Traditional to New Media .pdf
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
SAP Ariba Sourcing PPT for learning material
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Funds Management Learning Material for Beg
Exploring VPS Hosting Trends for SMBs in 2025
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
Mathew Digital SEO Checklist Guidlines 2025
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Uptota Investor Deck - Where Africa Meets Blockchain
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Internet Safety for Seniors presentation
250152213-Excitation-SystemWERRT (1).ppt
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Ethics in Information System - Management Information System
The Evolution of Traditional to New Media .pdf
newyork.pptxirantrafgshenepalchinachinane
SAP Ariba Sourcing PPT for learning material
Ad

6. Kerberos.ppt

  • 1. Authentication Services • Kerberos – A Private-key Authentication Service • X.509 directory authentication service
  • 2. Threats in a distributed environment • Distributed computing model, client/server • A user gains access to a WS, and pretend to be another • A user alters the network address of a WS to impersonate another WS • A user eavesdrops and uses a replay to gain entrance or disrupt operations
  • 3. Kerberos • Trusted key server system from MIT • Provides centralised private-key third-party authentication in a distributed network – Allows users access to services distributed through network – Without needing to trust all workstations – Rather all trust a central authentication server – Efficiency • Two versions in use: 4 & 5
  • 4. Kerberos Requirements • First published report identified its requirements as: – security – reliability – transparency – scalability • Implemented using an authentication protocol based on Needham-Schroeder • A pure private-key scheme
  • 5. A 3-step improvements leading to Kerberos V4 • A simple authentication dialogue – Has to enter password for each server – Plaintext transmission of password • AS+TGS model – Enter the password once for multiple services – Difficulty in choosing lifetime • V4 model – Use private session keys – Can also verify server – AS is the KDC for (C, TGS) – TGS is the KDC for (C, V)
  • 6. I. A Simple Authentication Dialogue
  • 8. Analysis of Simple Authentication Dialogue • The Ticket is encrypted to prevent alteration or forgery. • The Server ID is included in the Ticket so that the server can verify that it has decrypted the correct ticket. • By including the network address ADc masquerade is not possible Limitations – Has to enter password for each server egs:Mail server, File server, Print Server – Plaintext transmission of password-Eavesdropper to capture password
  • 9. II. A More Secure Authentication Dialogue
  • 11. Analysis of More Secure Authentication Dialogue Limitations • An opponent could eavesdrop on the network and capture a copy of the ticket-granting ticket and then wait for the legitimate user to log out. Then the opponent could forge the legitimate user's network address and files available to the Legitimate user • Opponent captures a service-granting ticket and uses it before it expires, the opponent has access to the corresponding service • Servers to authenticate themselves to users. Otherwise false server would then be in a position to act as a real server and capture any information from the user and deny the true service to the user.
  • 12. Additional Requirements: • A network service (the TGS or an application service) mustbe able to prove that the person using a ticket is the same person to whom that ticket was issued. • Servers to authenticate themselves to users..
  • 13. Kerberos 4 Overview • A basic third-party authentication scheme • Have an Authentication Server (AS) – users initially negotiate with AS to identify self – AS provides a authentication credential (ticket granting ticket TGT) • Have a Ticket Granting server (TGS) – users subsequently request access to other services from TGS on basis of users TGT
  • 16. Kerberos Realms • a Kerberos environment consists of: – a Kerberos server – a number of clients, all registered with server – application servers, sharing keys with server • this is termed a realm – typically a single administrative domain • Inter-realm authentication possible – Mutual trust required
  • 18. X.509 Version 3 • has been recognised that additional information is needed in a certificate – email/URL, policy details, usage constraints • rather than explicitly naming new fields defined a general extension method • extensions consist of: – extension identifier – criticality indicator – extension value
  • 19. Certificate Extensions • key and policy information – convey info about subject & issuer keys, plus indicators of certificate policy • certificate subject and issuer attributes – support alternative names, in alternative formats for certificate subject and/or issuer • certificate path constraints – allow constraints on use of certificates by other CA’s