Kerberos Authentication Protocol
Kerberos Authentication Protocol
AUTHENTICATION
PROTOCOL
BY:- SEJAL (CSE 5TH SEMESTER)
Roll No:- 2016265
Smart Card ID:- BTBTC20122
INTRODUCTION
WHAT IS KERBEROS?
Id = Alice
NOTE:-
• TGT can only be opened by TGS
• The final output can only be opened
AS
by Alice.
• Alice cannot open the TGT.
Formation of TGT
SESSION
ALICE KEY
A SYMMETRIC KEY
(KS)
SHARED WITH THE
TGS
ENCRPYT
OUTPUT*
Alice
TGT
AS
TGT
SESSION
KEY (AS) SENDS BACK ENCRYPTED
(KS) (KS) AND (TGT) TO ALICE
KS + TGT
OUTPUT*
STEP 2: Obtaining a Service Granting Ticket (SGT)
Timestamp
OUTPUT*
ENCRYPTED TGS
TIMESTAMP TGT BOB
(ET)
TGS
ENCRYPT B’S SECRET KEY
BOB KAB
OUTPUT*
TGS sends response back to Alice
STEP 3: USER CONTACTS BOB FOR ACCESSING THE SERVER
Timestamp
Alice Sending KAB
OUTPUT*
SECRET KEY TO BE
ENCRYPT SHARED BY ALICE AND
BOB
BOB (KAB)
Alice had received this
from TGS
ENCRYPTED
(ALICE + KAB) ENCRYPTED WITH
TIMESTAMP
BOB’S SECRET KEY
(ET)
ENCRYPTED TIME
STAMP
(ET)*
Bob
ENCRYPT
Secret key shared by
Alice and Bob
(KAB)
ENCRYPTED
TIME STAMP
(ET)*
DISADVANTAGES
• Kerberos only provides authentication for clients and services.
• Vulnerable to users making poor password choices.
CONCLUSION
From this presentation we got to know a detail working of the Kerberos protocol. The
Kerberos protocol is a trusted third party authentication protocol which basically
authenticates the client with the help of the authentication server (AS) and issues a
Ticket Granting Ticket (TGT) to the client, it also issues service ticket to the client. With
the help of the service ticket, client can directly communicate with the server. It provides
The reliable communication over the distributed environment by identifying the client
identities. It is a protocol which authenticates its client with the help of Ticket system.
REFERENCES
• Atul Kahate:- “Cryptography and Network Security” – Mc Graw Hill India(2013)
• https://www.techtarget.com/searchsecurity/definition/Kerberos
• https://www.ijert.org/research/kerberos-protocol-a-review-IJERTV4IS040843.pdf
• https://www.freecodecamp.org/news/how-does-kerberos-work-authentication-protocol/