kerberos

17
KERBEROS: THE MIT’S COMPUTER NETWORK PROTOCOL AND ITS DEVELOPMENT

Upload: gichelle-amon

Post on 26-Jan-2015

489 views

Category:

Education


0 download

DESCRIPTION

Network protocol, history, uses, application, procedures

TRANSCRIPT

Page 1: Kerberos

KERBEROS: THE MIT’S COMPUTER NETWORK PROTOCOL AND ITS

DEVELOPMENT

Page 2: Kerberos

KERBEROS

Third Party Authentication

Strong Cryptography

Page 3: Kerberos

Origin

Greek Mythology

Page 4: Kerberos

Modern History

Massachusetts's Institute of Technology

Project Athena

Steve Miller and Clifford Neuman

Page 5: Kerberos

evolutionEarly Kerberos (v1, v2,

v3)

Kerberos 4

Kerberos 5

Page 6: Kerberos

BASIC DESIGN

Authentication Server

Ticket Granting Server

File Server

Key Distribution Center

CLIENT

Page 7: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

UserName: gichyPassword: 12345?><

Client Secret Key

One way Hash

Page 8: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

User gichy wants to use file server

(clear text)

Page 9: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

Checks if client is in

the database

Generates the Client Secret Key

Page 10: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

2 Messages being sent

A. Client / TGS Session Key

B. Ticket Granting Ticket

Client decodes A:Using its secret

key

Client CAN’T decode B

Page 11: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

C. Ticket Granting Ticket

from B

D. Authenticator

TGS decrypts C and gets Ticket Granting Ticket

TGS decrypts D using

Client/TGS Session key and

gets Client ID and Timestamp

TGS checks that Client ID from C

matches Client ID from D and

timestamp does not exceed ticket

validity period

Page 12: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT E. Client-to-FS ticket

F. Client/Server Session KeyClient decodes F

using Client/TGS session key,

obtains Client/Server Session Key

Page 13: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

E. Client-to-FS ticket

G. AuthenticatorFS decrypts E FS decrypts G FS checks that Client ID from E

matches Client ID from G and

timestamp does not exceed validity

period

Page 14: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

H. The timestamp

found in G + I encrypted with

the Client/Server Session Key

Client decrypts H

Page 15: Kerberos

BASIC DESIGN

AS

TGS

FS

CLIENT

Client issues service request

to the FS

FS services the request

Page 16: Kerberos

CONCLUSION

Page 17: Kerberos

Thank You