520 likes | 1.62k Views
Kerberos. Authentication protocol. Submitted By. Poonam chauhan. What is Kerberos.
E N D
Kerberos Authentication protocol
Submitted By • Poonamchauhan
What is Kerberos • Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. • aimed primarily at a client –server model • Kerberos uses as its basis the symmetric Needham-Schroeder protocol.
It makes use of a trusted third party, termed a key distribution centre (KDC), which consists of two logically separate parts: an Authentication Server (AS) and a Ticket Granting Server (TGS). • The KDC maintains a database of secret keys; each entity on the network — whether a client or a server — shares a secret key known only to itself and to the KDC. • For communication purposes the KDC generates a session key which communicating parties use to encrypt their transmissions. • The security of the protocol relies heavily on short-lived assertions of authenticity called Kerberos tickets.
Working of Kerberos • Kerberos operates by encrypting data with a symmetric key. • When working with the encryption key, the details are actually sent to a key distribution center, or KDC, instead of sending the details directly between each computer.
Continue • The authentication service, or AS, receives the request by the client and verifies that the client is indeed the computer it claims to be. This is usually just a simple database lookup of the user’s ID.
Continue… • Upon verification, a timestamp is created.
continue.. • The key is sent back to the client in the form of a ticket-granting ticket, or TGT. This is a simple ticket that is issued by the authentication service.
Continue.. • The client submits the ticket-granting ticket to the ticket-granting server, or TGS, to get authenticated.
Continue.. • The TGS creates an encrypted key with a timestamp, and grants the client a service ticket.
Continue.. • The client decrypts the ticket, tells the TGS it has done so, and then sends its own encrypted key to the service.
Continue.. • The service decrypts the key, and makes sure the timestamp is still valid. If it is, the service contacts the key distribution center to receive a session that is returned to the client
Continue.. • The client decrypts the ticket. If the keys are still valid, communication is initiated between client and server.
Challenge response authentication • challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated. • Mutual authentication is performed using a challenge-response handshake in both directions; the server ensures that the client knows the secret, and the client also ensures that the server knows the secret, which protects against a rogue server impersonating the real server.
Continue… • 1. The first system creates a challenge code made up of random numbers. • 2. This code is sent to the second system, which generates a response to the received code. This response and a challenge code of its own are then sent back to the first system. • 3. The first system verifies the response of the second system, and then sends a response to the challenge code it received. • 4. When the second system receives the response, it is verified. If all is well, it notifies the first system that they are indeed mutually authenticated. • Example password storage
Limitation • First and foremost is the need of the Kerberos server. • Next, we have the issue of clock synchronization.
Advantages • Protect against • Man in middle attack • Eavesdropping • Sniffing
Refernces • http://en.wikipedia.org/wiki/Kerberosprotocol