Authentication Applications



Similar documents
Authentication Applications

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Authentication Application

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Chapter 15 User Authentication

CS 356 Lecture 28 Internet Authentication. Spring 2013

Key Management and Distribution

Key Management and Distribution

CS549: Cryptography and Network Security

How To Use Kerberos

Introduction to Network Security Key Management and Distribution

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

How To Make A Trustless Certificate Authority Secure

7 Key Management and PKIs

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

PUBLIC-KEY CERTIFICATES

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Cryptography and Network Security Digital Signature

Scenario. Roadmap. ! The simplified architecture! The complete architecture Pre-authentication Delegation. Realms

Chapter 16: Authentication in Distributed System

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Kerberos and Active Directory symmetric cryptography in practice COSC412

1. a. Define the properties of a one-way hash function. (6 marks)

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

SECURITY IMPLEMENTATION IN HADOOP. By Narsimha Chary( ) Siddalinga K M( ) Rahman( )

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture)

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computer and Network Security. Outline

Key Management and Distribution

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lecture 10 - Authentication

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Lecture VII : Public Key Infrastructure (PKI)

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Asymmetric cryptosystems fundamental problem: authentication of public keys

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

Kerberos. Login via Password. Keys in Kerberos

Standards and Products. Computer Security. Kerberos. Kerberos

[SMO-SFO-ICO-PE-046-GU-

Ciphermail S/MIME Setup Guide

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security Standards. Key distribution Kerberos SSL/TLS

Message authentication and. digital signatures

CS 392/681 - Computer Security

Cryptography and Network Security

Network Security: Public Key Infrastructure

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Q: Why security protocols?

X.509 Certificate Generator User Manual

TELSTRA RSS CA Subscriber Agreement (SA)

Djigzo S/MIME setup guide

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Authentication, Access Control, Auditing and Non-Repudiation

Applying Cryptography as a Service to Mobile Applications

Authentication Protocols

Authenticity of Public Keys

Chapter 7 Managing Users, Authentication, and Certificates

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos

Chapter 4 Virtual Private Networking

Configuring Digital Certificates

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

ASA Remote Access VPN with OCSP Verification under Microsoft Windows 2012 and OpenSSL

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

CSCI 454/554 Computer and Network Security. Final Exam Review

Overview. SSL Cryptography Overview CHAPTER 1

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

CERTIFICATION PRACTICE STATEMENT UPDATE

Certificates and network security

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

Public Key Infrastructure (PKI)

Transcription:

Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service then X.509 directory authentication service

Kerberos trusted key server system from MIT provides centralised private-key third-party authentication in a distributed network allows users access to services distributed through network without needing to trust all workstations rather all trust a central authentication server two versions in use: 4 & 5

Kerberos Requirements first published report identified its requirements as: security reliability transparency scalability implemented using an authentication protocol based on Needham-Schroeder

Kerberos 4 Overview a basic third-party authentication scheme have an Authentication Server (AS) users initially negotiate with AS to identify self AS provides a non-corruptible authentication credential (ticket granting ticket TGT) have a Ticket Granting server (TGS) users subsequently request access to other services from TGS on basis of users TGT

Kerberos 4 Overview

Kerberos Realms a Kerberos environment consists of: a Kerberos server a number of clients, all registered with server application servers, sharing keys with server this is termed a realm typically a single administrative domain if have multiple realms, their Kerberos servers must share keys and trust

Kerberos Version 5 developed in mid 1990 s provides improvements over v4 addresses environmental shortcomings encryption alg, network protocol, byte order, ticket lifetime, authentication forwarding, interrealm auth and technical deficiencies double encryption, non-std mode of use, session keys, password attacks specified as Internet standard RFC 1510

X.509 Authentication Service part of CCITT X.500 directory service standards distributed servers maintaining some info database defines framework for authentication services directory may store public-key certificates with public key of user signed by certification authority also defines authentication protocols uses public-key crypto & digital signatures algorithms not standardised, but RSA recommended

X.509 Certificates issued by a Certification Authority (CA), containing: version (1, 2, or 3) serial number (unique within CA) identifying certificate signature algorithm identifier issuer X.500 name (CA) period of validity (from - to dates) subject X.500 name (name of owner) subject public-key info (algorithm, parameters, key) issuer unique identifier (v2+) subject unique identifier (v2+) extension fields (v3) signature (of hash of all fields in certificate) notation CA<<A>> denotes certificate for A signed by CA

X.509 Certificates

Obtaining a Certificate any user with access to CA can get any certificate from it only the CA can modify a certificate because cannot be forged, certificates can be placed in a public directory

CA Hierarchy if both users share a common CA then they are assumed to know its public key otherwise CA's must form a hierarchy use certificates linking members of hierarchy to validate other CA's each CA has certificates for clients (forward) and parent (backward) each client trusts parents certificates enable verification of any certificate from one CA by users of all other CAs in hierarchy

CA Hierarchy Use

Certificate Revocation certificates have a period of validity may need to revoke before expiry, eg: 1. user's private key is compromised 2. user is no longer certified by this CA 3. CA's certificate is compromised CA s maintain list of revoked certificates the Certificate Revocation List (CRL) users should check certs with CA s CRL

Authentication Procedures X.509 includes three alternative authentication procedures: One-Way Authentication Two-Way Authentication Three-Way Authentication all use public-key signatures

One-Way Authentication 1 message ( A->B) used to establish the identity of A and that message is from A message was intended for B integrity & originality of message message must include timestamp, nonce, B's identity and is signed by A

Two-Way Authentication 2 messages (A->B, B->A) which also establishes in addition: the identity of B and that reply is from B that reply is intended for A integrity & originality of reply reply includes original nonce from A, also timestamp and nonce from B

Three-Way Authentication 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks has reply from A back to B containing signed copy of nonce from B means that timestamps need not be checked or relied upon

X.509 Version 3 has been recognised that additional information is needed in a certificate email/url, policy details, usage constraints rather than explicitly naming new fields defined a general extension method extensions consist of: extension identifier criticality indicator extension value

Certificate Extensions key and policy information convey info about subject & issuer keys, plus indicators of certificate policy certificate subject and issuer attributes support alternative names, in alternative formats for certificate subject and/or issuer certificate path constraints allow constraints on use of certificates by other CA s