1 / 16

Kerberos

Kerberos. Kerberos. In Greek mythology, Kerberos is 3-headed dog that guards entrance to Hades “Wouldn’t it make more sense to guard the exit?” In security, Kerberos is an authentication system based on symmetric key crypto Originated at MIT Based on work by Needham and Schroeder

trixie
Download Presentation

Kerberos

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kerberos Chapter 10 Real world security protocols

  2. Kerberos • In Greek mythology, Kerberos is 3-headed dog that guards entrance to Hades • “Wouldn’t it make more sense to guard the exit?” • In security, Kerberos is an authentication system based on symmetric key crypto • Originated at MIT • Based on work by Needham and Schroeder • Relies on a Trusted Third Party (TTP) Chapter 10 Real world security protocols

  3. Motivation for Kerberos • Authentication using public keys • N users N key pairs • Authentication using symmetric keys • N users requires about N2 keys • Symmetric key case does not scale! • Kerberos based on symmetric keys but only requires N keys for N users • But must rely on TTP • Advantage is that no PKI is required Chapter 10 Real world security protocols

  4. Kerberos KDC • Kerberos Key Distribution Center or KDC • Acts as a TTP • TTP must not be compromised! • KDC shares symmetric key KA with Alice, key KB with Bob, key KC with Carol, etc. • Master key KKDC known only to KDC • KDC enables authentication and session keys • Keys for confidentiality and integrity • In practice, the crypto algorithm used is DES Chapter 10 Real world security protocols

  5. Kerberos Tickets • KDC issues a ticket containing info needed to access a network resource • KDC also issues ticket-granting tickets or TGTs that are used to obtain tickets • Each TGT contains • Session key • User’s ID • Expiration time • Every TGT is encrypted with KKDC • TGT can only be read by the KDC Chapter 10 Real world security protocols

  6. Kerberized Login • Alice enters her password • Alice’s workstation • Derives KA from Alice’s password • Uses KA to get TGT for Alice from the KDC • Alice can then use her TGT (credentials) to securely access network resources • Plus: Security is transparent to Alice • Minus: KDC must be secure --- it’s trusted! Chapter 10 Real world security protocols

  7. Kerberized Login • Kerberos used for authentication • Key KA derived from Alice’s password • KDC creates session key SA • Workstation decrypts SA, TGT, forgets KA • TGT = E(“Alice”, SA, KKDC) Alice wants Alice’s a TGT password E(SA,TGT, KA) Computer Alice KDC Chapter 10 Real world security protocols

  8. Alice Requests Ticket to Bob • Once Alice’s computer receives the TGT, it can then use the TGT to request to network resource • For example, spse Alice wants to talk to Bob • Alice’s computer presents the TGT to KDC, along with an “authenticator” that is design to avoid a replay • It responds with a “ticket to Bob” • Then Alice’ computer can use the ticket to Bob to comm with Bob via his computer Chapter 10 Real world security protocols

  9. Alice Requests Ticket to Bob • REQUEST = (TGT, authenticator) where authenticator = E(timestamp, SA) • REPLY = E(“Bob”, KAB, ticket to Bob, SA) • ticket to Bob = E(“Alice”, KAB, KB) • KDC gets SA from TGT to verify timestamp I want to talk to Bob Talk to Bob REQUEST REPLY Computer Alice KDC Chapter 10 Real world security protocols

  10. Alice Uses Ticket to Bob • ticket to Bob = E(“Alice”, KAB, KB) • authenticator = E(timestamp, KAB) • Bob decrypts “ticket to Bob” to get KAB which he then uses to verify timestamp ticket to Bob, authenticator E(timestamp + 1,KAB) Alice’s Computer Bob Chapter 10 Real world security protocols

  11. Kerberos • Session key SAused for • authentication • Can also be used for confidentiality/integrity • Timestamps used for • mutual authentication • Recall that timestamps reduce number of messages • Acts like a nonce that is known to both sides • Note:timeis a security-critical parameter! Chapter 10 Real world security protocols

  12. Kerberos Security: Questions • When Alice logs in, KDC sends E(SA,TGT,KA)whereTGT = E(“Alice”, SA, KKDC) Q: Why is TGT encrypted with KA? A: Extra work and no added security! • Q: In Alice’s Kerberized login to Bob, why can Alice remain anonymous?A: ticket to Bob = E(“Alice”, KAB, KB) Chapter 10 Real world security protocols

  13. Kerberos Security: Questions • Q: Why is “ticket to Bob” sent to Alice?A: If the “ticket to Bob” arrives at Bob before Alice initiates contact with Bob, the Bob would need to maintain the state, that is, he would have to remember the key KAB and it is for Alice and so on. • Q: Where is replay prevention in Kerberos? A: timestamp Chapter 10 Real world security protocols

  14. Kerberos Design Alternatives • Kerberos could have Alice’s workstation remember password and use that for authentication • Then no KDC required, but scaling issue will problem • session key SA used for authentication • Hard to protect password on workstation • Every computer on the network would become TTP Chapter 10 Real world security protocols

  15. Kerberos Design Alternatives • Could have KDC remember session key instead of putting it in a TGT • Then no need for TGTs • But stateless KDC is big feature of Kerberos Chapter 10 Real world security protocols

  16. Kerberos Keys • In Kerberos, KA = h(Alice’s password) • Could instead generate random KA and • Compute Kh = h(Alice’s password) • And workstation stores E(KA, Kh) • Then KA need not change (on workstation or KDC) when Alice changes her password • But E(KA, Kh) subject to password guessing • This alternative approach is often used in applications (but not in Kerberos) Chapter 10 Real world security protocols

More Related