Unit II Key Managment and Authentication
Unit II Key Managment and Authentication
Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509 Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles, Remote User-Authentication Using Symmetric Encryption, Kerberos Systems,
Remote User Authentication Using Asymmetric Encryption.
2. A third party can select the key and physically deliver it to A and B.
3. If A and B have previously and recently used a key, one party can transmit the
New key to the other, encrypted using the old key.
The scenario assumes that each user shares a unique master key with the
key distribution center (KDC)
Let us assume that user A wishes to establish a logical connection with B and
Requires a one-time session key to protect the data transmitted over the connection.
A has a master key, K, known only to itself and the KDC; similarly, B shares the
a master key Kb with the KDC. The following steps occur.
1.A issues a request to the KDC for a session key to protect a logical connection
to B.
2. The KDC responds with a message encrypted using Ka .
The opponent has less cipher text to work with for any given session key. On the
Other hand, the distribution of session keys delays the start of any exchange and
Places a burden on network capacity.
K
E
Y
M
A
N
A
G
E
M
E
N
T
:
3.1 K
e
Several techniques have been proposed for the distribution of public keys.
Virtually all these proposals can be grouped into the following general schemes:
• Public announcement
• Public-key authority.
• Public-key certificates
On the face of it, the point of public-key encryption is that the public key is public. Thus, if
there is some broadly accepted public-key algorithm, such as RSA, any participant can send
his or her public key to any other participant or broadcast the key to the community at large
(Refer fig be
1. The authority maintains a directory with a {name, public key} entry for each participant.
2. Each participant registers a public key with the directory authority. Registration would
have to be in person or by some form of secure authenticated communication.
3.A participant may replace the existing key with a new one at any time, either because of
the desire to replace a public key that has already been used for a large amount of data, or
because the corresponding private key has been compromised in some way.
4. Participants could also access the directory electronically. For this purpose, secure,
authenticated communication from the authority to the participant is mandatory.
Public-Key Authority:
2. The authority responds with a message that is encrypted using the authority’s
Private key, PR Thus, A is able to decrypt the message using the authority’s public key.
Therefore, A is assured that the message originated with the authority. The message includes
the following:
• B’s public key, PUb, which A can use to encrypt messages destined for B
• The original request used to enable A to match this response with the corresponding
earlier request and to verify that the original request was not altered before reception by the
authority
• The original timestamp given so A can determine that this is not an old message from
CS354 NETWORK SECURITY 7 UNIT II KEY MANAGEMENT AND AUTHENTICATION
the authority containing a key other than B’s current public key
3. A stores B’s public key and also uses it to encrypt a message to B containing an identifier
of A (IDA) and a nonce (N), which is used to identify this transaction uniquely.
4, 5. B retrieves A’s public key from the authority in the same manner as A retrieved B’s
public key. At this point, public keys have been securely delivered to A and B, and they may
begin their protected exchange. However, two additional steps are desirable:
7. A returns N2, which is encrypted using B’s public key, to assure B that its correspondent
Public-Key Certificates:
The public key certificate relies on certificates that can be used by participants to
exchange keys without contacting a public-key authority, in a way that is as reliable as if the
keys were obtained directly from a public-key authority. In essence, a certificate consists of a
public key, an identifier of the key owner, and the whole block signed by a trusted third party.
1. Any participant can read a certificate to determine the name and public key of the
certificate’s owner.
2. Any participant can verify that the certificate originated from the certificate authority and
is not counterfeit.
A certificate scheme is illustrated in Figure above. Each participant applies to the certificate
authority, supplying a public key and requesting a certificate. Application must be in person
or by some form of secure authenticated communication.
For participant A, the authority provides a certificate of the form
where PRauth is the private key used by the authority and T is a timestamp. A may
then pass this certificate on to any other participant, who reads and verifies the certificate
as follows:
The recipient uses the authority’s public key, PUauth, to decrypt the certificate. Because the
certificate is readable only using the authority’s public key, this verifies that the certificate
came from the certificate authority. The elements IDA and PUa provide the recipient with the
name and public key of the certificate’s holder. The timestamp T validates the currency of the
certificate.
One scheme has become universally accepted for formatting public-key certificates: the
X.509 standard. X.509 certificates are used in most network security applications, including
IP security, transport layer security (TLS), and S/MIME.
• Version: Differentiates among successive versions of the certificate format; the default is
version 1. If the Issuer Unique Identifier or Subject Unique Identifier are present, the value
must be version 2. If one or more extensions are present, the version must be version 3.
• Serial number: An integer value, unique within the issuing CA, that is unambiguously
associated with this certificate.
• Signature algorithm identifier: The algorithm used to sign the certificate, together with
any associated parameters. Because this information is repeated in the Signature field at the
end of the certificate, this field has little, if any, utility.
• Issuer name: X.500 name of the CA that created and signed this certificate.
• Period of validity: Consists of two dates: the first and last on which the certificate is valid.
• Subject name: The name of the user to whom this certificate refers. That is, this certificate
certifies the public key of the subject who holds the corresponding private key.
• Subject’s public-key information: The public key of the subject, plus an identifier of the
algorithm for which this key is to be used, together with any associated parameters.
• Issuer unique identifier: An optional bit string field used to identify uniquely the issuing
CA in the event the X.500 name has been reused for different entities.
• Subject unique identifier: An optional bit string field used to identify uniquely the subject
in the event the X.500 name has been reused for different entities.
• Extensions: A set of one or more extension fields. Extensions were added in version 3 and
are discussed later in this section.
• Signature: Covers all of the other fields of the certificate; it contains the hash code of the
other fields encrypted with the CA’s private key. This field includes the signature algorithm
identifier.
• End entity: A generic term used to denote end users, devices (e.g., servers, routers), or any
other entity that can be identified in the subject field of a public key certificate. End entities
typically consume and/or support PKI-related services.
• Certification authority (CA): The issuer of certificates and (usually) certificate revocation
lists (CRLs). It may also support a variety of administrative functions, although these are
often delegated to one or more registration authorities.
• Registration: This is the process whereby a user first makes itself known
to a CA (directly, or through an RA), prior to that CA issuing a certificate or
certificates for that user. Registration begins the process of enrolling in a
PKI. Registration usually involves some off- line or online procedure for
mutual authentication. Typically, the end entity is issued one or more shared
secret keys used for subsequent authentication.
• Key pair recovery: Key pairs can be used to support digital signature
creation and verification, encryption and decryption, or both. When a key
pair is used for encryption/decryption, it is important to provide a mechanism
to recover the necessary decryption keys when normal access to the keying
material is no longer possible, otherwise it
CS354 NETWORK SECURITY 15 UNIT II KEY MANAGEMENT AND
AUTHENTICATION
will not be possible to recover the encrypted data. Loss of access to the
decryption key can result from forgotten passwords/PINs, corrupted disk
drives, damage to hardware tokens, and so on. Key pair recovery allows end
entities to restore their encryption/decryption key pair from an authorized key
backup facility (typically, the CA that issued the end entity’s certificate).
• Key pair update: All key pairs need to be updated regularly (i.e.,
replaced with a new keypair) and new certificates issued. Update is required
There are four general means of authenticating a user’s identity, which can be
Used alone or in combination:
2.7 KERBEROS
Kerberos is an authentication service developed as part of Project Athena at MIT.
2. Version 5
CS354 NETWORK SECURITY 17 UNIT II KEY MANAGEMENT AND
AUTHENTICATION
The first published report on Kerberos listed the following requirements:
1. Secure
2. Reliable
3. Transparent
4. Scalable
Kerberos Version 4:
Version 4 of Kerberos makes use of DES to provide authentication service.
More Secure Authentication Dialogue:
Two problems remain in the above scenario.
1. First, we would like to minimize the number of times that a user has to enter a password.
2. The second problem is that the earlier scenario involved a plaintext transmission of the password.
An eavesdropper could capture the password and use any service accessible to the victim.
To solve these problems, a new scheme has been introduced for avoiding plaintext passwords and a new
server, known as the ticket-granting server (TGS).
(5) C V: ID C || Ticket v
TGS:
The new service, TGS, issues tickets to users who have been authenticated to AS.
Thus, the user first requests a ticket-granting ticket (Ticket tgs) from the AS.
The client saves each service-granting ticket and uses it to authenticate its user to a server each time
a particular service is requested.
If this lifetime is very short, then the user will be repeatedly asked for a password.
If the lifetime is long, then an opponent has a greater opportunity for replay.
Ticket tgs = E(K tgs , [K c,tgs ||ID c ||AD c ||ID tgs ||TS 2|| Lifetime 2 ])
Ticket tgs = E(K tgs , [K c,tgs ||ID C|| AD C|| ID tgs|| TS 2 ||Lifetime 2])
Ticket v = E(K v , [K c,v|| ID C ||AD C|| ID v ||TS 4||Lifetime 4 ])
2. The AS responds with a message, encrypted with a key derived from the user's password ( K c ) that
contains the ticket.
3. C sends the TGS a message that includes the ticket plus the ID of the requested service.
4. The reply from the TGS follows the form of message (2).
5. C now has a reusable service-granting ticket for V. When C presents this ticket it also sends an
authenticator.
6. The server can reply as shown in message (6). The server returns the value of the timestamp from
the authenticator, incremented by 1, and encrypted in the session key.
Finally, at the conclusion of this process, the client and server share a secret key.
Kerberos Realms and Multiple Kerberi:
A full-service Kerberos environment consisting of a Kerberos server, a number of clients, and a number of
application servers requires the following:
1. The Kerberos server must have the user ID and hashed passwords of all participating users in its
database. All users are registered with the Kerberos server.
2. The Kerberos server must share a secret key with each server. All servers are registered with the
Kerberos server.
CS354 NETWORK SECURITY 21 UNIT II KEY MANAGEMENT AND
AUTHENTICATION
Such an environment is referred to as a Kerberos realm.
Realm:
A Kerberos realm is a set of managed nodes that share the same Kerberos database.
The read only copy of the Kerberos database resides on the Kerberos master computer system,
which should be kept in a physically secure room.
All changes to the database must be made on the master computer system.
Changing or accessing the contents of a Kerberos database requires the Kerberos master password.
Kerberos provides a mechanism for supporting such interrealm authentication. For two realms to
support interrealm authentication, a third requirement is added:
o The Kerberos server in each interoperating realm shares a secret key with the server in the
other realm. The two Kerberos servers are registered with each other.
2. The user's client follows the usual procedures to gain access to the local TGS and then requests a
ticket-granting ticket for a remote TGS.
3. The client can then apply to the remote TGS for a service-granting ticket for the desired server in
the realm of the remote TGS.
(4) TGS C: E( K c,tgs , [ K c,tgsrem ||ID tgsrem ||TS 4|| Ticket tgsrem ])
The ticket presented to the remote server (Vrem ) indicates the realm in which the user was originally
authenticated. The server chooses whether to honor the remote request.
Kerberos Version 5:
Kerberos Version 5 provides a number of improvements over version 4.
2. Technical deficiencies
Environmental shortcomings:
1. Encryption system dependence
5. Authentication forwarding
Technical deficiencies
1. Double encryption
3. Session keys
4. Password attacks
(2) AS C Realm c ||ID C ||Ticket tgs|| E( K c , [ K c,tgs ||Times ||Nonce 1 ||Realm tgs|| ID tgs ])
Ticket tgs = E( K tgs , [ Flags ||K c,tgs|| Realm c|| ID c|| AD c|| Times])
(4) TGS C Realm c ||ID c ||Ticket v ||E( K c,tgs , [ K c,v ||Times ||Nonce 2 ||Realmv ||ID v ])
Ticket tgs = E(K tgs , [ Flags ||K C,tgs ||Realm c|| ID C|| AD C ||Times])
3. Message (3) includes an authenticator, a ticket, and the name of the requested service.
4. Message (4) has the same structure as message (2), returning a ticket plus information needed by
the client, the latter encrypted with the session key now shared by the client and the TGS.
5. Message (5), the client may request as an option that mutual authentication is required. The
authenticator includes several new fields as follows:
Subkey
Sequence numbers
Ticket Flags
The flags field included in tickets in version 5 supports expanded functionality compared to that available
in version 4. Table 14.4 summarizes the flags that may be included in a ticket.
Kerberos Version 5 Flags
1. INITIAL
2. PRE-AUTHENT
3. HW-AUTHENT
4. RENEWABLE
CS354 NETWORK SECURITY 25 UNIT II KEY MANAGEMENT AND
AUTHENTICATION
5. MAY-POSTDATE
6. POSTDATED
7. INVALID
8. PROXIABLE
9. PROXY
10. FORWARDABLE