SlideShare a Scribd company logo
1
Kerberos
Kerberos
Authentication
Applications
Soma Debnath
Assistant Professor
AIITK
2
Outline
Outline
• Security Concerns
• Kerberos
• X.509 Authentication Service
• Recommended reading and Web Sites
3
Security Concerns
Security Concerns
• key concerns are confidentiality and
timeliness
• to provide confidentiality must encrypt
identification and session key info
• which requires the use of previously shared
private or public keys
• need timeliness to prevent replay attacks
• provided by using sequence numbers or
timestamps or challenge/response
4
KERBEROS
KERBEROS
In Greek mythology, a many headed dog,
the guardian of the entrance of Hades
5
KERBEROS
KERBEROS
• Users wish to access services on
servers.
• Three threats exist:
– User pretend to be another user.
– User alter the network address of a
workstation.
– User eavesdrop on exchanges and use a
replay attack.
6
KERBEROS
KERBEROS
• Provides a centralized authentication
server to authenticate users to
servers and servers to users.
• Relies on conventional encryption,
making no use of public-key
encryption
• Two versions: version 4 and 5
• Version 4 makes use of DES
7
Kerberos Version 4
Kerberos Version 4
• Terms:
– C = Client
– AS = authentication server
– V = server
– IDc = identifier of user on C
– IDv = identifier of V
– Pc = password of user on C
– ADc = network address of C
– Kv = secret encryption key shared by AS an V
– TS = timestamp
– || = concatenation
8
A Simple Authentication
A Simple Authentication
Dialogue
Dialogue
(1) C  AS: IDc || Pc || IDv
(2) AS  C: Ticket
(3) C  V: IDc || Ticket
Ticket = EKv[IDc || Pc || IDv]
9
Version 4 Authentication
Version 4 Authentication
Dialogue
Dialogue
• Problems:
– Lifetime associated with the ticket-granting
ticket
– If too short  repeatedly asked for password
– If too long  greater opportunity to replay
• The threat is that an opponent will steal the
ticket and use it before it expires
10
Version 4 Authentication Dialogue
Version 4 Authentication Dialogue
Authentication Service Exhange: To obtain Ticket-Granting Ticket
(1) C  AS: IDc || IDtgs ||TS1
(2) AS  C: EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs]
Ticket-Granting Service Echange: To obtain Service-Granting Ticket
(3) C  TGS: IDv ||Tickettgs ||Authenticatorc
(4) TGS  C: EKc [Kc,¨v|| IDv || TS4 || Ticketv]
Client/Server Authentication Exhange: To Obtain Service
(5) C  V: Ticketv || Authenticatorc
(6) V  C: EKc,v[TS5 +1]
11
Overview of Kerberos
Overview of Kerberos
12
Request for Service in
Request for Service in
Another Realm
Another Realm
13
Difference Between
Difference Between
Version 4 and 5
Version 4 and 5
• Encryption system dependence (V.4 DES)
• Internet protocol dependence
• Message byte ordering
• Ticket lifetime
• Authentication forwarding
• Interrealm authentication
14
Kerberos Encryption Techniques
Kerberos Encryption Techniques
15
PCBC Mode
PCBC Mode
16
Kerberos - in practice
Kerberos - in practice
• Currently have two Kerberos versions:
• 4 : restricted to a single realm
• 5 : allows inter-realm authentication, in beta test
• Kerberos v5 is an Internet standard
• specified in RFC1510, and used by many utilities
• To use Kerberos:
• need to have a KDC on your network
• need to have Kerberised applications running on all participating systems
• major problem - US export restrictions
• Kerberos cannot be directly distributed outside the US in source format
(& binary versions must obscure crypto routine entry points and have no
encryption)
• else crypto libraries must be reimplemented locally
17
X.509 Authentication
X.509 Authentication
Service
Service
• Distributed set of servers that
maintains a database about users.
• Each certificate contains the public
key of a user and is signed with the
private key of a CA.
• Is used in S/MIME, IP Security,
SSL/TLS and SET.
• RSA is recommended to use.
18
X.509 Formats
X.509 Formats
19
Typical
Typical Digital Signature
Digital Signature
Approach
Approach
20
Obtaining a User’s
Obtaining a User’s
Certificate
Certificate
• Characteristics of certificates
generated by CA:
– Any user with access to the public key of
the CA can recover the user public key
that was certified.
– No part other than the CA can modify
the certificate without this being
detected.
21
X.509 CA Hierarchy
X.509 CA Hierarchy
22
Revocation of Certificates
Revocation of Certificates
• Reasons for revocation:
– The users secret key is assumed to be
compromised.
– The user is no longer certified by this
CA.
– The CA’s certificate is assumed to be
compromised.
23
Authentication Procedures
Authentication Procedures
24
Recommended Reading and
Recommended Reading and
WEB Sites
WEB Sites
• www.whatis.com (search for kerberos)
• Bryant, W. Designing an Authentication
System: A Dialogue in Four Scenes.
http://web.mit.edu/kerberos/www/dialogue.html
• Kohl, J.; Neuman, B. “The Evolotion of
the Kerberos Authentication Service”
http://web.mit.edu/kerberos/www/papers.html
• http://www.isi.edu/gost/info/kerberos/

More Related Content

PPT
Chapter 4Application AuthonicationApplication Authonication.ppt
PPT
Chapter 4
PPT
Authentication Application in Network Security NS4
PPTX
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
PDF
Computer security module 4
PDF
An Introduction to Kerberos
PDF
PPTX
Kerberos : An Authentication Application
Chapter 4Application AuthonicationApplication Authonication.ppt
Chapter 4
Authentication Application in Network Security NS4
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
Computer security module 4
An Introduction to Kerberos
Kerberos : An Authentication Application

Similar to Kerberos Presentation: Provides a centralized authentication server to authenticate users to servers and servers to users. Relies on conventional encryption, making no use of public-key encryption Two versions: version 4 and 5 Version 4 makes use of DES (20)

PPT
ch14.ppt
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Kerberos Protocol
PDF
Presentation of Kerberos as per ECE scheme
PDF
Kerberos Security in Distributed Systems
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Module III CNS Kerberos and its example.pptx
PPTX
NS UNIT 2 Key Distribution and Management
PPT
Kerberos
PPTX
Kerberos
PDF
module1 network security.pdf
PPT
6. Kerberos.ppt
PPT
PPT
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol
PPT
Kerberos full with detailed explanation tkerberos.ppt
PPT
1699250.ppt
PPTX
Kerberos
PPTX
Chapter 23 Internet Authentication Applications
PPTX
kerberos
ch14.ppt
CRYPTOGRAPHY AND NETWORK SECURITY
Kerberos Protocol
Presentation of Kerberos as per ECE scheme
Kerberos Security in Distributed Systems
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Module III CNS Kerberos and its example.pptx
NS UNIT 2 Key Distribution and Management
Kerberos
Kerberos
module1 network security.pdf
6. Kerberos.ppt
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol
Kerberos full with detailed explanation tkerberos.ppt
1699250.ppt
Kerberos
Chapter 23 Internet Authentication Applications
kerberos
Ad

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
RMMM.pdf make it easy to upload and study
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Lesson notes of climatology university.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Institutional Correction lecture only . . .
01-Introduction-to-Information-Management.pdf
GDM (1) (1).pptx small presentation for students
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
RMMM.pdf make it easy to upload and study
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Computing-Curriculum for Schools in Ghana
Basic Mud Logging Guide for educational purpose
Lesson notes of climatology university.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Structure & Organelles in detailed.
Institutional Correction lecture only . . .
Ad

Kerberos Presentation: Provides a centralized authentication server to authenticate users to servers and servers to users. Relies on conventional encryption, making no use of public-key encryption Two versions: version 4 and 5 Version 4 makes use of DES

  • 2. 2 Outline Outline • Security Concerns • Kerberos • X.509 Authentication Service • Recommended reading and Web Sites
  • 3. 3 Security Concerns Security Concerns • key concerns are confidentiality and timeliness • to provide confidentiality must encrypt identification and session key info • which requires the use of previously shared private or public keys • need timeliness to prevent replay attacks • provided by using sequence numbers or timestamps or challenge/response
  • 4. 4 KERBEROS KERBEROS In Greek mythology, a many headed dog, the guardian of the entrance of Hades
  • 5. 5 KERBEROS KERBEROS • Users wish to access services on servers. • Three threats exist: – User pretend to be another user. – User alter the network address of a workstation. – User eavesdrop on exchanges and use a replay attack.
  • 6. 6 KERBEROS KERBEROS • Provides a centralized authentication server to authenticate users to servers and servers to users. • Relies on conventional encryption, making no use of public-key encryption • Two versions: version 4 and 5 • Version 4 makes use of DES
  • 7. 7 Kerberos Version 4 Kerberos Version 4 • Terms: – C = Client – AS = authentication server – V = server – IDc = identifier of user on C – IDv = identifier of V – Pc = password of user on C – ADc = network address of C – Kv = secret encryption key shared by AS an V – TS = timestamp – || = concatenation
  • 8. 8 A Simple Authentication A Simple Authentication Dialogue Dialogue (1) C  AS: IDc || Pc || IDv (2) AS  C: Ticket (3) C  V: IDc || Ticket Ticket = EKv[IDc || Pc || IDv]
  • 9. 9 Version 4 Authentication Version 4 Authentication Dialogue Dialogue • Problems: – Lifetime associated with the ticket-granting ticket – If too short  repeatedly asked for password – If too long  greater opportunity to replay • The threat is that an opponent will steal the ticket and use it before it expires
  • 10. 10 Version 4 Authentication Dialogue Version 4 Authentication Dialogue Authentication Service Exhange: To obtain Ticket-Granting Ticket (1) C  AS: IDc || IDtgs ||TS1 (2) AS  C: EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs] Ticket-Granting Service Echange: To obtain Service-Granting Ticket (3) C  TGS: IDv ||Tickettgs ||Authenticatorc (4) TGS  C: EKc [Kc,¨v|| IDv || TS4 || Ticketv] Client/Server Authentication Exhange: To Obtain Service (5) C  V: Ticketv || Authenticatorc (6) V  C: EKc,v[TS5 +1]
  • 12. 12 Request for Service in Request for Service in Another Realm Another Realm
  • 13. 13 Difference Between Difference Between Version 4 and 5 Version 4 and 5 • Encryption system dependence (V.4 DES) • Internet protocol dependence • Message byte ordering • Ticket lifetime • Authentication forwarding • Interrealm authentication
  • 16. 16 Kerberos - in practice Kerberos - in practice • Currently have two Kerberos versions: • 4 : restricted to a single realm • 5 : allows inter-realm authentication, in beta test • Kerberos v5 is an Internet standard • specified in RFC1510, and used by many utilities • To use Kerberos: • need to have a KDC on your network • need to have Kerberised applications running on all participating systems • major problem - US export restrictions • Kerberos cannot be directly distributed outside the US in source format (& binary versions must obscure crypto routine entry points and have no encryption) • else crypto libraries must be reimplemented locally
  • 17. 17 X.509 Authentication X.509 Authentication Service Service • Distributed set of servers that maintains a database about users. • Each certificate contains the public key of a user and is signed with the private key of a CA. • Is used in S/MIME, IP Security, SSL/TLS and SET. • RSA is recommended to use.
  • 19. 19 Typical Typical Digital Signature Digital Signature Approach Approach
  • 20. 20 Obtaining a User’s Obtaining a User’s Certificate Certificate • Characteristics of certificates generated by CA: – Any user with access to the public key of the CA can recover the user public key that was certified. – No part other than the CA can modify the certificate without this being detected.
  • 22. 22 Revocation of Certificates Revocation of Certificates • Reasons for revocation: – The users secret key is assumed to be compromised. – The user is no longer certified by this CA. – The CA’s certificate is assumed to be compromised.
  • 24. 24 Recommended Reading and Recommended Reading and WEB Sites WEB Sites • www.whatis.com (search for kerberos) • Bryant, W. Designing an Authentication System: A Dialogue in Four Scenes. http://web.mit.edu/kerberos/www/dialogue.html • Kohl, J.; Neuman, B. “The Evolotion of the Kerberos Authentication Service” http://web.mit.edu/kerberos/www/papers.html • http://www.isi.edu/gost/info/kerberos/