Case Studies: Needham - Schroeder, Kerberos, TLS, 802.11 Wifi
Case Studies: Needham - Schroeder, Kerberos, TLS, 802.11 Wifi
11 WiFi
The authentication protocols originally published by Needham and Schroeder [1978] are
at the heart of many security techniques. We present them in detail in Section 11.6.1.
One of the most important applications of their secret-key authentication protocol is the
Kerberos system [Neuman and Ts’o 1994], which is the subject of our second case study
(Section 11.6.2). Kerberos was designed to provide authentication between clients and
servers in networks that form a single management domain (intranets).
Our third case study (Section 11.6.3) deals with the Transport Layer Security
(TLS) protocol. This was designed specifically to meet the need for secure electronic
transactions. It is now supported by most web browsers and servers and is employed in
most of the commercial transactions that take place via the Web.
Our final case study (Section 11.6.4) illustrates the difficulty of engineering
secure systems. The IEEE 802.11 WiFi standard was published in 1999 with a security
specification included. But subsequent analysis and attacks have shown the
specification to be severely inadequate. We identify the weaknesses and relate them to
the cryptographic principles covered in this chapter.