Authentication Protocols
Authentication Protocols
on
User Authentication Protocols
Biswaraj Sen
Lecturer (C.S.E)
Road Map
• What does Security mean?
• Goals of Security.
• What is Authentication?
• Classification of User Authentication Protocols.
• Challenge Response Protocols
• Diffie-Hellman Protocol
• Key Distribution Center (KDC)
• Needham-Schroeder Protocol
• Kerberos
• Summary
What does Security Mean?
• In simplest form, it is concerned with
making sure that nosy people cannot
read/modify messages intended for other
recipients.
Goals of Security
• Privacy: Sender and Receiver expect
confidentiality.
• Integrity: Content of a message has not
been altered.
• Authentication: Deals with determining
whom a system is communicating.
• Non-repudiation: Deals with signatures.
Authentication
• Authentication is a technique that verifies
the identity of one entity for another.
• Categories of Authentication:
– Message Authentication: Identity of the sender
is verified for every single message.
– User Authentication: Identity of the user is
verified once for the entire duration of system
access.
Classification of User
Authentication Protocol
• Based on Shared Secret Key:
– Example: Challenge Response Protocol.
• Based on Public key cryptography:
– Examples:
• Diffie-Hellman Protocol
• KDC
• Needham-Schroeder Protocol
• Kerberos
Challenge Response Protocol
• Based on Shared Secret Key.
• Both communicating parties (Alice & Bob)
share secret key KAB agreed upon on the
somewhere else i.e. over telephone or in
person etc.
• Here one party sends a random number to
the other, who then transforms it in special
way and then returns the result.
Working of Challenge Response
Protocol
ALICE BOB
1
A, RA
2
RB, KAB(RA)
3
KAB(RB)
A, B: Identifies Alice and Bob respectively
Ri’s: Signifies challenges, where the subscript identifies challenger
Ki’s: Signifies keys, where i indicates the owner.
Attack on Challenge Response
Protocol
TRUDY BOB
1
A, RT
2
RB, KAB(RT)
3
A, RB
4
RB2, KAB(RB)
5
KAB(RB)
ALICE BOB
R1=Gx Mod N
R1
R2=Gy Mod N
R2
K=(R2)x Mod N K=(R1)y Mod N
R1=Gx Mod N
R1
R2=Gz Mod N
R2
R2
R3=Gy Mod N
R3
KA
KAB
KB
A, B, KAB
KB
A, B, KAB
ALICE BOB
A
KB
RB
RA, A, B KB
RB
KDC
KA
KB
RA sol, B,KAB KAB A RB sol
Working of Needham-Schroeder
Protocol (Contd..)
ALICE BOB
KAB KB
R1 RB sol, A, KAB
KAB
R1-1, R2
KAB
R2-1
Data exchange
Kerberos
• It is an authentication protocol based on KDC.
• Developed at MIT and has become very popular.
• Used in various systems including Win2000
• Kerberos include three types of Servers:-
– Authentication Server (AS)
– Ticket Granting Server (TGS)
– Real Server
Kerberos (Contd..)
• Authentication Server:
– It is the KDC in Kerberos protocol.
– Each user registers with AS and is granted an Identity
and Password.
– AS maintains the database of each user with their
corresponding Identity and Password.
• Ticket-Granting Server:
– Issues a ticket for actual server.
• Real Server:
– Provides services to the users.
Kerberos Operation
A
KA
KS
KTG
A, KS
KS KTG
T B A, KS
KS KB
B, KAB A, KAB
Kerberos Operation (Contd..)
KAB KB
T A, KAB
KAB
T+1