Kerberos Version 4 Kerberos Version 5
Kerberos Version 4 Kerberos Version 5
Kerberos Version 4
1. It was released in the late 1980s
2. It uses the principal name partially
3. It uses the 'receiver-makes-right' encoding system.
4. It contains only a few IP addresses.
5. No transitive cross-realm authentication support.
Kerberos Version 5
1. It was published in 1993.
2. It uses the entire principal name.
3. It uses the ASN. 1 coding system.
4. Contains multiple IP addresses.
5. Reasonable support is available for transitive cross-realm authentication.
Reflection attack: In computer security, a reflection attack is a method of attacking a challenge-response
authentication system that uses the same protocol in both directions. That is, the same challenge-
response protocol is used by each side to authenticate the other side. The essential idea of the attack is
to trick the target into providing the answer to its own challenge.
IPsec provides an easy mechanism for implementing Virtual Private Network (VPN) for such institutions.
VPN technology allows institution’s inter-office traffic to be sent over public Internet by encrypting
traffic before entering the public Internet and logically separating it from other traffic. The simplified
working of VPN is shown in the following diagram −
PKIX : Public-key infrastructure (PKI) is the set of hardware, software, people, policies, and procedures
needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric
cryptography.
The principal objective of developing a PKI is to enable secure, convenient, and efficient acquisition of
public keys.
Moreover, The Internet Engineering Task Force (IETF) Public Key Infrastructure X.509 (PKIX) working
group has been the driving force behind setting up a formal (and generic) model based on X.509.
The figure shows the interrelationship among the key elements of the PKIX model.
These elements are:
End entity: A generic term used to denote end users, devices (e.g., servers, routers), or any other
entity that can identify in the subject field of a public key certificate.
A certification authority (CA): The issue of certificates and (usually) certificate revocation lists
(CRLs). It may also support a variety of administrative functions, although these often delegated
to one or more Registration Authorities.
Registration authority (RA): An optional component that can assume a number of administrative
functions from the CA. The RA is often associated with the end entity registration process but can
assist in a number of other areas as well.
CRL issuer: An optional component that a CA can delegate to publish CRLs.
Repository: A generic term used to denote any method for storing certificates and CRLs so that
they can be retrieved by end entities.
PKIX Management Functions: Public-Key Infrastructure
PKIX identifies a number of management functions that potentially need to supported by
management protocols which are:
Registration
Initialization
Certification
Key pair recovery
Key pair update
Revocation request
Cross-certification
Digital Certificate:
Digital Certificates provide a means of proving your identity in electronic transactions, much like a driver
license or a passport does in face-to-face interactions. With a Digital Certificate, you can assure friends,
business associates, and online services that the electronic information they receive from you are
authentic.
Digital Signature:
Digital signature is a mechanism by which a message is authenticated i.e. proving that a message is
effectively coming from a given sender, much like a signature on a paper document. For instance,
suppose that Alice wants to digitally sign a message to Bob. To do so, she uses her private-key to encrypt
the message; she then sends the message along with her public-key (typically, the public key is attached
to the signed message). Since Alice’s public-key is the only key that can decrypt that message, a
successful decryption constitutes a Digital Signature Verification, and meaning that there is no doubt
that it is Alice’s private key that encrypted the message.
Triple DES: There are two variants of Triple DES known as 3-key Triple DES (3TDES) and 2-key Triple DES
(2TDES).
3-KEY Triple DES
Before using 3TDES, user first generates and distributes a 3TDES key K, which consists of three different
DES keys K1, K2 and K3. This means that the actual 3TDES key has length 3×56 = 168 bits. The
encryption scheme is illustrated as follows −
The encryption-decryption process is as follows −
Encrypt the plaintext blocks using single DES with key K1.
Now decrypt the output of step 1 using single DES with key K2.
Finally, encrypt the output of step 2 using single DES with key K3.
The output of step 3 is the cipher text.
Decryption of a cipher text is a reverse process. User first decrypt using K3, then encrypt with
K2, and finally decrypt with K1.
Due to this design of Triple DES as an encrypt–decrypt–encrypt process, it is possible to use a 3TDES
(hardware) implementation for single DES by setting K1, K2, and K3 to be the same value. This provides
backwards compatibility with DES.
Second variant of Triple DES (2TDES) is identical to 3TDES except that K3is replaced by K1. In other
words, user encrypts plaintext blocks with key K1, then decrypt with key K2, and finally encrypt with
K1 again. Therefore, 2TDES has a key length of 112 bits.
Triple DES systems are significantly more secure than single DES, but these are clearly a much slower
process than encryption using single DES.