Chapter 4
Chapter 4
Applications
Ola Flygt
Växjö University, Sweden
http://w3.msi.vxu.se/users/ofl/
[email protected]
+46 470 70 86 49
1
Outline
Security Concerns
Kerberos
X.509 Authentication Service
2
Security Concerns
key concerns are confidentiality and
timeliness
to provide confidentiality one must encrypt
identification and session key info which
requires the use of previously shared private
or public keys
need timeliness to prevent replay attacks.
provided by using sequence numbers or
timestamps or challenge/response
3
KERBEROS
6
Kerberos terminology
Terms:
C = client
AS = authentication server
V = server
IDc = identifier of user on C
IDv = identifier of V
Pc = password of user on C
ADc = network address of C
Kv = secret encryption key shared by AS an V
TS = timestamp
|| = concatenation
7
A simple Authentication
Dialogue
(1) C AS: IDc || Pc || IDv
(2) AS C: Ticket
(3) C V: IDc || Ticket
8
Problems with the
simple dialogue
Password in clear text
Solution: Encrypt the password
Need to authenticate on each request
Solution: Let a ticket have a lifetime
Need to authenticate to each new server
Solution: Split the Kerberos server up in two
parts, one Authentication Server (AS) and
one Ticket Granting Server (TGS).
9
A better Authentication
Dialogue
Once per user logon session:
(1) C AS: IDc || IDtgs
(2) AS C: E [Kc , Tickettgs]
Tickettgs =E(Ktgs, [IDc || ADc || IDtgs || TS1 || Lifetime1])
13
Overview of Kerberos
14
Request for Service in
Another Realm
15
Difference Between
Version 4 and 5
Encryption system independence (v4 DES)
Internet protocol independence (v4 IP)
Message byte ordering (v5 ASN.1)
Ticket lifetime (v4 max 21 hours)
Authentication forwarding
Inter realm authentication
16
Kerberos Encryption Techniques
17
PCBC Mode
18
Kerberos - in practice
19
X.509 Authentication Service
Distributed set of servers that
maintains a database about users.
Each certificate contains the public
key of a user and is signed with the
private key of a CA.
Is used in e.g. S/MIME, IP Security,
SSL/TLS and SET.
RSA is recommended to use.
20
X.509 Formats
21
Typical Digital
Signature Approach
22
Obtaining a User’s Certificate
Characteristics of certificates
generated by CA:
Any user with access to the public key of
the CA can recover the user public key
that was certified.
No part other than the CA can modify the
certificate without this being detected.
23
X.509 CA Hierarchy
24
Revocation of Certificates
25
Authentication Procedures
26