CSE331: Introduction to Networks and Security. Lecture 29 Fall 2006



Similar documents
How To Use Kerberos

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

1. a. Define the properties of a one-way hash function. (6 marks)

CS 4803 Computer and Network Security

Cryptography and Network Security

Authentication Applications

Network Security Protocols

SYSTEM MODEL KERBEROS OBJECTIVES PHYSICAL SECURITY TRUST: CONSOLIDATED KERBEROS MODEL TRUST: BILATERAL RHOSTS MODEL

Chapter 16: Authentication in Distributed System

Basic network security threats

Authentication Applications

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Network Security Standards. Key distribution Kerberos SSL/TLS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Kerberos. Login via Password. Keys in Kerberos

CS 494/594 Computer and Network Security

Key Management (Distribution and Certification) (1)

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

Authentication. Agenda. IT Security course Lecture April 14 th Niels Christian Juul 2. April 14th, 2003

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Attestation and Authentication Protocols Using the TPM

Chapter 15 User Authentication

Scenario. Roadmap. ! The simplified architecture! The complete architecture Pre-authentication Delegation. Realms

Architecture of Enterprise Applications III Single Sign-On

10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture)

Implementing a Kerberos Single Sign-on Infrastructure

This Course. Modelling and Analysing of Security Protocol: Lecture 1. Introductions to Modelling Protocols. Course Outline. Course Outline.

TELE 301 Network Management. Lecture 18: Network Security

Two SSO Architectures with a Single Set of Credentials

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Security: Focus of Control. Authentication

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography and network security CNET4523

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

E- Encryption in Unix

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Copyright Warning & Restrictions

Module: Authentication. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

"When you have crossed the river and have advanced a little further, some aged women weaving at the loom will beg you to lend a hand for a short

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

Factotum Sep. 23, 2013

Chapter 8. Network Security

Introduction to Network Security Key Management and Distribution

Authentication Application

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Lecture 10 - Authentication

Certificate-Based Single Sign-on Mechanism for Multi-Platform Distributed Systems

IceWarp Server - SSO (Single Sign-On)

Q: Why security protocols?

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Chapter 10. Network Security

Basic network security threats

Principles of Network Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Cryptography and Network Security Digital Signature

Key Management and Distribution

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 3

Guide to SASL, GSSAPI & Kerberos v.6.0

HOBCOM and HOBLink J-Term

Message authentication and. digital signatures

CERTIFICATE-BASED SINGLE SIGN-ON MECHANISM FOR MULTI-PLATFORM DISTRIBUTED SYSTEMS Magyari Attila*, Genge Bela**, Haller Piroska**

Key Management and Distribution

Lecture 10 - Authentication

Computing Security. Access Control. Port Protection. Electrostatic Modeling of CMOS sensor array 1. Distributed System Authentication.

High-available Authorization and Authentication

True False questions (25 points + 5 points extra credit)

SECURITY IMPLEMENTATION IN HADOOP. By Narsimha Chary( ) Siddalinga K M( ) Rahman( )

Kerberos authentication made easy on OpenVMS

Chapter 7: Network security

TELE 301 Network Management. Lecture 16: Remote Terminal Services

CS 356 Lecture 28 Internet Authentication. Spring 2013

COSC 472 Network Security

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Authentication Protocols

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Client Server Registration Protocol

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

CSCI 454/554 Computer and Network Security. Final Exam Review

An Authentication and Key Distribution System for Open Network Systems

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Single sign-on enabled OpenCms

Introduction to Computer Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Cryptography and Network Security Chapter 14

Key Management and Distribution

Connecting Web and Kerberos Single Sign On

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

Transcription:

CSE331: Introduction to Networks and Security Lecture 29 Fall 2006

Announcements Project 3 is due Today Can submit electronically (mail savi@seas) By midnight Project 4 will be on the web this afternoon Due last day of classes Implementing cryptographic protocols in Java CSE331 Fall 2004 2

Midterm 2 Grades Average: 74 Std dev: 13 CSE331 Fall 2004 3

Key Establishment Establishing a "session key" A shared key used for encrypting communications for a short duration -- a session Need to authenticate first Symmetric keys. Point-to-Point. Needham-Schroeder. Kerberos. CSE331 Fall 2004 4

Symmetric Keys Key establishment using only symmetric keys requires use of pre-distribution keys to get things going. Then protocol can be based on: Point to point distribution, or Key Distribution Center (KDC). CSE331 Fall 2004 5

Point-to-Point Session Key K AB {K S,t,B} Should also use timestamps & nonces. Session key should include a validity duration. Could also use public key cryptography to Authenticate Exchange symmetric shared key CSE331 Fall 2004 6

Key Distribution Centers Give me a key to talk with Bart Here is the key Tom gave us this session key CSE331 Fall 2004 7

Distribution Center Setup A wishes to communicate with B. T (trusted 3 rd party) provides session keys. T has a key K AT in common with A and a key K BT in common with B. A authenticates T using a nonce n A and obtains a session key from T. A authenticates to B and transports the session key securely. CSE331 Fall 2004 8

Needham-Schroeder Protocol 1. A T : A, B, n A 2. T A : K AT {K S, n A, B, K BT {K S, A} } A decrypts with K AT and checks n A and B. Holds K S for future correspondence with B. 3. A B : K BT {K S, A} B decrypts with K BT. 4. B A : K S {n B } A decrypts with K S. 5. A B : K S {n B 1} B checks n B -1. CSE331 Fall 2004 9

Attack Scenario 1 1. A T : A, B, n A 2. T C (A) : K AT {k, n A, B, K BT {K S, A}} C is unable to decrypt the message to A; passing it along unchanged does no harm. Any change will be detected by A. CSE331 Fall 2004 10

Attack Scenario 2 1. A C (T) : A, B, n A 2. C (A) T : A, C, n A 3. T A : K AT {K S, n A, C, K CT {K S, A}} Rejected by A because the message contains C rather than B. CSE331 Fall 2004 11

Attack Scenario 3 1. A C (T) : A, B, n A 2. C T : C, B, n A 3. T C : K CT {K S, n A, B, K BT {K S, C}} 4. C (T) A : K CT {K S, n A, B, K BT {K S, C}} A is unable to decrypt the message. CSE331 Fall 2004 12

Attack Scenario 4 1. C T : C, B, n A 2. T C : K CT {K S, n A, B, K BT {K S, C}} 3. C (A) B : K BT {K S, C} B will see that the purported origin (A) does not match the identity indicated by the distribution center. CSE331 Fall 2004 13

Valid Attack The attacker records the messages on the network in particular, the messages sent in step 3 Consider an attacker that manages to get an old session key K S. That attacker can then masquerade as Alice: Replay starting from step 3 of the protocol, but using the message corresponding to K S. Could be prevented with time stamps. CSE331 Fall 2004 14

Kerberos Key exchange protocol developed at MIT in the late 1980 s Central server provides tickets Tickets (also known as capabilities): Unforgeable Nonreplayable Authenticated Represent authority Designed to work with NFS (network file system) Also saves on authenticating for each service e.g. with rlogin or rsh. CSE331 Fall 2004 15

Kerberos Authentication User TGT Kerberos Server Service Request Service ticket Service request Auth. key File Server Ticket-granting server Unique keys Other Server CSE331 Fall 2004 16

Kerberos Login U = User s machine S = Kerberos Server Has a database of user passwords: userid pwd G = Ticket granting server Kerberos ticket granting ticket U S : userid, G, n U S U : k pwd {n U, K UG }, K SG {T(U,G)} S G : K SG {K UG, userid} T(X,Y) = X, Y, L, K XY Session key Ticket lifetime CSE331 Fall 2004 17

Kerberos Service Request U G : K UG {userid, t}, K SG {T}, req(f), n A G U : K UG {K UF,n A }, K F {T AF } U F : K AF {userid, t}, K F {T AF } CSE331 Fall 2004 18

Kerberos Benefits Distributed access control No passwords communicated over the network Cryptographic protection against spoofing All accesses mediated by G (ticket granting server) Limited period of validity Servers check timestamps against ticket validity Limits window of vulnerability Timestamps prevent replay attacks Servers check timestamps against their own clocks to ensure fresh requests Mutual authentication User sends nonce challenges CSE331 Fall 2004 19

Kerberos Drawbacks Requires available ticket granting server Could become a bottleneck Must be reliable All servers must trust G, G must trust servers They share unique keys Kerberos requires synchronized clocks Replay can occur during validity period Not easy to synchronize clocks User s machine could save & replay passwords Password is a weak spot Kerberos does not scale well Hard to replicate authentication server and ticket granting server Duplicating keys is bad, extra keys = more management CSE331 Fall 2004 20