Is Unit 3 PPT - Part 2
Is Unit 3 PPT - Part 2
Something the individual have (static biometrics): e.g. fingerprint, retina ,face
Message authentication is the procedure that allows two parties to verify that
contents of received message have not been changed and source is authentic.
Authentication Protocols
An important application area of authentication is authentication
protocols.
Mutual Authentication :
Mutual Authentication Protocols used to satisfy or convince
communicating parties about each others identity and to exchange
session keys
(e.g. email) because it is not necessary for the sender and receiver
be online at the same time
Header will deliver by store and forward email protocol , like SMTP
The Kerberos is a Greek word that signify a three- headed dog (used to
keep outsiders away)
Following threats from Attacker exist & servers should not allow :
1. Attacker can use particular workstation and act as a valid user working
from that workstation.
So any request sent from altered workstation appears to come from valid
workstation
Note : In the above cases, an attacker may use services and data that he is
not authorized to use.
Kerberos
To solve these problems , instead of using authentication protocol
at each server, Kerberos provides a centralized authentication
server that authenticate users to servers and servers to users
Means Kerberos should be strong enough that opponent does not find weak link.
The AS shares a unique secret key with each server and these keys
distributed in secure manner.
Kerberos Version 4
When any client makes a request from its workstation to some
server for service, the following process takes place :
C = Client , AS = Authentication Server , V = Server , IDc = Identifier of user
on client C.
2. C in the client workstation requests for the user’s password and then
sends a message to the AS that contains user’s ID, user’s password and
server’s ID.
Kerberos Version 4
Message from client to AS = (IDc ,Pc, IDv)
3. AS now checks the pair IDc and Pc in it’s database to see whether
user has given proper password and whether user is permitted to use
server V.
4. If both tests are passed , then AS accepts the user as authentic and
then tell the server that user is authentic.
5. The ticket is encrypted using secret key shared by AS and this server.
So, Ticket = E[ IDc , ADc, IDv]
10. If these two matches, then the server is assured that user is
authenticated.
Function of TGS is to issue tickets to the users who are authenticated by AS.
Whenever the user wants to access a new service , he requests the TGS
using the ticket to authenticate itself.
The TGS then grants the ticket for the particular service.
Client saves each service – granting ticket issued by TGS for later use to
authenticate it’s user to server whenever the user requests for particular
Kerberos Version 4
The new message dialogues are as :
1. Request from client to AS C → AS : IDc, IDtgs
2. Response from AS to C AS→ C : Ek (Tickettgs)
3. Request from client to TGS C→TGS : IDc, IDv, Tickettgs
4. Response from TGS to client TGS→C : Tickettgs
5. Message from client to server C→ V : IDc, Ticketv
Then third version was issued in 1995 and again revised in 2000.
5. Period of validity (TA) : This field consists of two dates ,the first and
last on which the certificate is valid.
If the corresponding public key is known to user , then user can verify that
certificate is signed by the CA is valid.
X.509 Certificates
Certificate Revocation
• In some cases certificates must be revoked before
its expiration.
• Certificates have a period of validity
• May need to revoke before expiry, eg:
1. user's private key is compromised
2. user is no longer certified by this CA
3. CA's certificate is compromised
• CA’s maintain list of revoked certificates.
– the Certificate Revocation List (CRL)
• Users should check certificates with CA’s CRL