FIT3031 Lecture Notes - Lecture 4: Session Key, Scalability, Public-Key Cryptography

88 views3 pages
L4: Authentication Applications
Organisaons mostly use open distributed architecture which consists of
Workstaons (clients); cannot be trusted for access control purposes
Distributed/Centralized servers
Due to using such things these threats exist:
User pretends to be another user
User alters the network address of a workstaon
User eavesdrops on exchanges and uses it to replay aack
Security approaches:
Rely on client workstations to assure users identy and rely on server to enforce a security
policy based on user id - good for small environments
Require that client systems authenticate themselves to servers, but trust the client systems
to assure users identy - good for small environments
Require the user to prove identity for each service on the server and also the server to
prove its identy to clients - good for large environments
Kerberos
Authencaon protocol
Provides a centralized authencaon server to authencate users to servers and servers to
users
Sasfies the following requirements:
Security : secure enough to prevent an eavesdropper to gaining informaon to
impersonate a user
Reliability : Ensure availability of service
Transparency : user should not be aware of authencaon taking place except
entering a password
Scalability : should be capable of supporng large number of clients and servers
Requires that:
You have KDC on your network
Have kerberised applicaons running on all parcipang systems
Overview
Employs an Authencaon Server (AS)
Provides a non-corrupble authencaon credenal (cket granng cket TGT)
Employs a Ticket Granng server ( TGS)
Users request access to other services from TGS using TGT
Authentication Operations:
1. User logs on to workstaon and requests service on host
2. AS verifies user's credenals in database
Creates a TGT and a session key
Results are encrypted using key derived from users password
3. Workstaon prompts user for password
Uses password to decrypt incoming message
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Document Summary

O(cid:396)ga(cid:374)isa(cid:415)o(cid:374)s (cid:373)ostl(cid:455) use ope(cid:374) dist(cid:396)i(cid:271)uted a(cid:396)(cid:272)hite(cid:272)tu(cid:396)e (cid:449)hi(cid:272)h (cid:272)o(cid:374)sists of. Wo(cid:396)ksta(cid:415)o(cid:374)s (cid:894)(cid:272)lie(cid:374)ts(cid:895); (cid:272)a(cid:374)(cid:374)ot (cid:271)e t(cid:396)usted fo(cid:396) a(cid:272)(cid:272)ess (cid:272)o(cid:374)t(cid:396)ol pu(cid:396)poses. Due to usi(cid:374)g su(cid:272)h thi(cid:374)gs these th(cid:396)eats e(cid:454)ist: Use(cid:396) alte(cid:396)s the (cid:374)et(cid:449)o(cid:396)k add(cid:396)ess of a (cid:449)o(cid:396)ksta(cid:415)o(cid:374) Use(cid:396) ea(cid:448)esd(cid:396)ops o(cid:374) e(cid:454)(cid:272)ha(cid:374)ges a(cid:374)d uses it to (cid:396)epla(cid:455) a(cid:425)a(cid:272)k. Rely on client workstations to assu(cid:396)e use(cid:396)s ide(cid:374)(cid:415)t(cid:455) a(cid:374)d (cid:396)el(cid:455) o(cid:374) se(cid:396)(cid:448)e(cid:396) to e(cid:374)fo(cid:396)(cid:272)e a se(cid:272)u(cid:396)it(cid:455) poli(cid:272)(cid:455) (cid:271)ased o(cid:374) use(cid:396) id - good fo(cid:396) s(cid:373)all e(cid:374)(cid:448)i(cid:396)o(cid:374)(cid:373)e(cid:374)ts. Require that client systems authenticate the(cid:373)sel(cid:448)es to se(cid:396)(cid:448)e(cid:396)s, (cid:271)ut t(cid:396)ust the (cid:272)lie(cid:374)t s(cid:455)ste(cid:373)s to assu(cid:396)e use(cid:396)s ide(cid:374)(cid:415)t(cid:455) - good fo(cid:396) s(cid:373)all e(cid:374)(cid:448)i(cid:396)o(cid:374)(cid:373)e(cid:374)ts. Require the user to prove identity for each service o(cid:374) the se(cid:396)(cid:448)e(cid:396) a(cid:374)d also the se(cid:396)(cid:448)e(cid:396) to p(cid:396)o(cid:448)e its ide(cid:374)(cid:415)t(cid:455) to (cid:272)lie(cid:374)ts - good fo(cid:396) la(cid:396)ge e(cid:374)(cid:448)i(cid:396)o(cid:374)(cid:373)e(cid:374)ts. P(cid:396)o(cid:448)ides a (cid:272)e(cid:374)t(cid:396)alized authe(cid:374)(cid:415)(cid:272)a(cid:415)o(cid:374) se(cid:396)(cid:448)e(cid:396) to authe(cid:374)(cid:415)(cid:272)ate use(cid:396)s to se(cid:396)(cid:448)e(cid:396)s a(cid:374)d se(cid:396)(cid:448)e(cid:396)s to use(cid:396)s. Security : se(cid:272)u(cid:396)e e(cid:374)ough to p(cid:396)e(cid:448)e(cid:374)t a(cid:374) ea(cid:448)esd(cid:396)oppe(cid:396) to gai(cid:374)i(cid:374)g i(cid:374)fo(cid:396)(cid:373)a(cid:415)o(cid:374) to i(cid:373)pe(cid:396)so(cid:374)ate a use(cid:396)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents