IS Unit 2
IS Unit 2
225
D = 10325476
E =c3d2e1f0
Mhese values are same as used
for SHA-1 algorithm.
Message processing: There are 10 rounds
f the rounds is similar, but
all
of 16
operationseach. The structure
each round uses different
Bnction. Each round makes
use of an additive constant. primitive logical
Ffh round is added to the The output of the
chaining variable input to the
first round.
EOutput: The final value of the
buffer is the output. It is 160-bit
digest.
message
Operations 160 80 64
Buffer size (bits) 160 160 128
Endian architecture Little endian Big endian Little endian
9.4 KERBEROS
Authentication of the user is very important to provide the security to any application.
Under project Athena at MIT, an authenticationsystem is developed known as Kerberos.
The objective of this project was to provide a huge network of computer workstations
so that undergraduate students can access their files stored on any workstation easily
from anywhere in the campus.
For this project, a symmetric encryption is used to provide authentication and
Security. These authenticate and identify the users and the services in the network
to each other. The most common way of authentication is the use of password. The
Server has a database of userid and password. When any user wants the service in
the
network,he has first log in by giving his user id and password. The serververifies
the user id and password from the database available with it. Once it matches with
the database, the user is permitted to use the necessary service. But as we already
Studied about the security issues of password authentication, they thought about some
new system for authentication.So, they developed Kerberos,which address the security
sSues using a password for authentication.
Cryptography and Information Security
226
there is no need of reveal
Kerberos is that
the
The key innovationin without revealing the secret. secret
They can identify about
the key by the user. over the can
Users
sending the secret or password network. In prove
their identity without
is used. Timestamp
helps to prove that when the Kerberos,
key
an encryption with shared secret, therequest1ssent,
timestamp and encrypted
the user created a a with shared secret key
request1s
decrypts the request and sent
to service. The service and the necessary service recovers the
successes is
timestamp. Then authentication encrypt the timestamp with provided to
If the user
uses wrong key and that
the user.
and authentication fails. In this key,then
not decrypt properly
the timestamp will This system is secure as shared case, the
service rejects
the request of the user. secret key
architectureis more complex is
over the network. Kerberos dueto the
not transmitted the
manner and to patch some of
use of a secret key in more convenient problems.
Authentication Ticket-granting
server server
Client
Server
the
The client sends his the service from
requests for a ticket to ticket-granting
user id
and
authentication server. The authentication server (AS) has a database of
Client
File server
Ticket
Login Credentials
request
Ticket
1. Random key encrypted with the user's
2. Random key encrypted with long-term key
the service's long-term key.
Authentication server
228
the authentication server,
every the user contacts
service if the
For of the users.
and it takes time for authentication To reduce load onAS
is increased theload
server, one more
server is introduced called on
the authentication
user requests his first service is for
tichet-granting
case the TGS, server
(TGS). Now, in this Thus, the database of user id aywhich then
additional tickets for other services. and
grants TGS
located with authentication server and the trust is with paseword
is
network.
time of login from the client
The message was sent automatically at the
initial
to the authentication server. The initial
message contains the user's identification
9.12. The authentication server
number and request for a TGT as shown in Figure
Request for
ticket granting
ticket
Authentication
server
Client
Ticket granting
ticket encrypted
with user's password
Server
04.3 Ticket-Granting
the load on the authentication server, one more server is
introduced called
server (TGS). TGS resolves the problem of password re-entry every time
To reduce
ticket-granting The TGS is located on the sameserver where
service requests. authentication
for new it is different from AS. The
located but logically purpose of the TGS is to
server key so that user has to enter his
the ticket and session password only once
provide additional services in the network by the use of
ticket and session key.
and obtained
Initially, the user sends the request for a ticket from the AS to talk tothe TGS.
t is called the ticket-granting ticket, or TGT. The key
session is encrypted
the user's secret key. TGT and the session key, the user
After receiving the
using
Rnests a TGS for a ticket. This can be done at any time if he wants to use any
service. The from TGS is encrypted with the session key. The user already has a
reply
session so there is no need of his own secret key. It is sort of like when you visit
key,
some industry or organisation. You have to show your regular ID to the receptionist
at the counter to get a guest D
(visitor card) for visit the industry or organisation.
This is work like client's request to AS. After verifying the user ID, the receptionist
jssue a guest ID or visitor card just like AS replies to the user by sending TGT
and the session key. Now, when you want to enter various rooms in the industry or
organisation, instead of showing your regular ID over and over again, which might
make it vulnerable to be dropped or stolen, you have to show your guest ID,which is
only valid for a short time anyway. This is like user does not have to use his password
once AS gives him the TGT and the session key. If it was stolen, you could get it
invalidated and be issued a new one quickly and easily, something that you could not
do with your regular ID.
The advantage of above scheme is that session key and ticket are used instead
ofuser's secret key. Therefore, if the session key is captured by the attacker, less
damage is happened as sessionkey and TGT are valid only for a limited time period.
But if the user has to use his secret key and the key is captured by the attacker, then
the more damage is happened than sessionkey and the TGT as the life of secret key
S more. This TGT, as well as any tickets that you obtain using it, is stored in the
edentials cache. The term "credentials" actually refers to both the ticket and the
session key in
conjunction.
Once the
is
client gets a TG key, then the client requests for a specific service. This
shown in Figure 9.13. The client sends to the TGS to obtain a ticket for
a request
the
service. The TGS can verify the client identification information encrypted in the
message with its
database of the TG key. Each ticket has a timestamp. The tìmestamp
protects from reuse of the
meSsage.
Security
and Information
Cyptography
230 ticket
Encrypted
ticket
granting
Ticket granting
service
Client
Session key
encrypted
TG key
with AS key
encrypted
identity,
the ticket-granting of the client and the newly
the about the identity
client's
After checking information cannot be changed or altered
The ticket contains with the ticket
the user.
key. The information
authentication
server.
session it to the server. This message
generated
He can only forward
by the client. a message to the application 9.14. As noted above, the
sends Figure
The client then as shown in information
and a
data embedded
in the authenticator
server may be encrypted using
the client and
the application
between
Athenticator
key
encrypted session Application
server
Client
Ticket for
requested service
application server.
between the client and the
Figure 9.14 Communication
Model
9.4.4 Kerberos Third-party Authentication used(termed
may be
more trusted authenticationservers authentication
In the Kerberos system, one or
provide third-party acquires
KDCs or key distribution servers). This is used to Client the
for
subsequent request 231
of identification for
proof so it is secured in
service and
transmission. The applications.
is encrypted detail of the This ticket
is as
follows: Kerberos
1 The user wants some seervice so he first
authentication
KDC
Ticket-granting ticket
Ticket-granting service
Jsername
2 3 4
5o
6 Service providing
server
1 User
Client
asswor
Figure 9.15 Authentication model.
232
which a client is requesting
The servicefor a
ticket
Target service: or to
a ticket.
3.
presenting which
the client is
It is the service by which the clients
service: receive
4. Initialticketing their
initial
tickets.
The service by which clients receive
service: tickets to
5. Ticket-granting specific
target services.
A ticket provided on demand by the initial
ticket:
6. Ticket-granting to the ticket-granting service in order
service which
must be presented to ticketing
request a
service ticket.
Model
9.4.6 Kerberos Authentication
model uses a symmetric key
The Kerberos authentication and Kerberos V uses DES and IDEA
encryption technique
KDC
4
2 3
5
ysemame 6
Target service
1 User Client
Passwo|
9.4.7
Cross-Realm Authentication
So far
we
Ifthe have discussed the
User cient using the service in one Kerberos environment.
from one
Kerberos enyironment wants to use the services from other
Cryptography and Information Security
234
authentication that user should be done
of
Kerberos environment,the
cross-realm authentication. bythe
which the belongs is called
user So,
the Kerberos
the services from other Kerberos environment without user
can
authentication by Use
clients one
environment. The realm use Kerbero8
users or of
Kerberos that
realm other than their own. to other
which belong to a
to services This authenticate
It is based on a trust between the property
as cross-authentication. known Kerberos
may be mono-directional, or bi-directional.
involved. This
relationship Mono-directional
users of Kerberos environment A can access the services of means the
Kerberos
B but not vice-versa. Bi-directional means the users of Kerber0s environment
access the services of Kerberos environment and vice-versa B
environment A
can
We discuss where there is only one authentication
the case server and
ticket-granting These servers may or may not be installed on the
server. only one
small. same
This can work well if the requests are
f the number of clients is machine.
If
more on
there are more number of requests to the AS and TGS. This the
network,
performance of AS and TGS. If the AS or TGS fails, the whole deterioratesthe
system fails.
single KDC cannot work properly forthe whole
network. This is just Therefore,
like to
work in a
small group which always give better performance. In the same way, the
large Kerberos
environment divides into distinct small realms. Each realm has its own authentication
serverand ticket-granting server. This helps to improve the performance and also aw
1.Direct relationship: It occurs when the KDC of one realm has direct trust in the
KDC of another realm (Figure 9.17), It allows the users of the latter realm to access
Direct trust
N M
N1 N2 Direct trust
M
The Kerberos authentication model offers a number of advantages over more traditional
authentication schemes.
1. User login on the machine with his id and password. His passwords
client
are never transmitted across the network in any form, i.e., encrypted or
plaintext form. Only shared secret key is transmitted across the network in
the encrypted form. This provides more security.
2. Client machine and server mutually authenticate each other during each
communication.
3. Kerberos authentication model use timestamp and lifetime information in the
ticket which limit the duration of their users' authentication. After specifhc
lifetime, ticket is invalid for authentication.
4. Once the authentication of the user takes place, he can use different services
across the Kerberos network without re-entering his personal information like
password.
236 Cryptography and Information Security
1. In Kerberos IV,DES algorithm used for encryption. But DES is not a secure
is
2. For a multi-user client system, the Kerberos authentication scheme fails due
to variety of ticket-stealing and replay attacks.
3. The AS modelis vulnerableto brute-forceattacks.
Many attacks are successfully carried out against Kerberos. These attacks include:
replay attacks,password guessing attacks, and inter-session chosen plaintext attacks
1. Replay attacks: A replay attack oceurs when an attacker captures a packet from
the network and sends that packet to a service as a user of that service. When the
packet is authenticated by the service, then the attacker can use the replay on behalf
of other user and access other user's resources. Use of authenticatorin Kerberos helps
to prevent replay attack.
The main assumptions about the Kerberos environment is that there should be
truston the hosts. But if the host is compromised, the attack can occur and the security
ofthe Kerberos may be broken. Ticket is stored in host's cache may be used for such
attack. But there is less possibility of such attacks.Dictionary attack is possible it
the user password is guessable. Timestamp prevents such attacks. If the user needs
more time for using the different services, then the small timestamp creates proDIeu
and again authenticationis required.In Kerberos 4, for long processes, tickets havits
small timestamp can have this problem.Kerberos version 5 solved this problem by
renewing the ticket after the end of time span allotted to a ticket.
Authentication
237
9.4.13 Comparisons of Kerberos with SSL
Socure socket layer protocol
(5SL) is also used for
comparison between Kerberos and SSL authentication.Table 9.7 shows the
4. lssuer name: It is X.500 name of the entity who signed the certificate.
5. Validity: Each has its life span. Validity gives the information about
certificate
this life span. The span can be as short as a few seconds or almost as
life