The Kerberos Authentication System Course Outline

Size: px
Start display at page:

Download "The Kerberos Authentication System Course Outline"

Transcription

1 The Kerberos Authentication System Course Outline Technical Underpinnings - authentication based on key sharing - Needham-Schroeder protocol - Denning and Sacco protocol Kerbeors V - Login and client-server authentication - Credential establishment and cache - Key Version Numbers - The KDC Database - Interrealm Authentication - Data Encryption - Data Integrity - Kerberos V Message Formats Kerbeors V 5 - ASN. Data Representation Language - Delegation of Rights - Ticket Lifetimes - Key Version Numbers - Interrealm Hierarchy - Preauthentication - KDC Database - Double TGT Authentication - Data Encryption / Integrity - Kerberos V 5 Message Formats and Protocol Flows Kerberos Future Developments and Use

2 Kerberos V Technical Underpinnings and Description

3 Authentication ased on Secret-Key Sharing A K A A and share secret key K A One-way authentication (?) A A { I } K A I Two-way (mutual) authentication A A { I A, I } K A I { I A } K A

4 Pairwise Authentication - O(n 2 ) keys A F C E D Trusted Third-Party Authentication - O(n) keys A KDC F C E D KDC shared long-term key (e.g., 6 mos.) shared session key (e.g., 8 hours) Key Distribution Center

5 Needham - Schroeder s Protocol (978) A = initiator peer, client; = recipient peer, server; K A = A s private, long-term, key K = s private, long-term, key I a, I A = A s nonces (challenges) I = s nonce (challenge) KDC (AS) = Authentication Server A KDC AS K ab <A, K A > <, K >. A,, I a 2. { I a,, K ab, { A, K ab } K }K A 3. { A, K ab } K A 5. { I - } K ab. { I } K ab Steps - 3 : distribution of session key K ab Steps, 5 : one-way authentication; i.e., authenticates A. { I } K ab A 5. { I -, I A } K ab 6. { I A- } K ab Steps - 6 : two-way(mutual) authentication of A and

6 Needham - Schroeder s Protocol (ctnd.). What if I a is not used in messages, 2? Intruder X can replay an old AS response to A s request. A, 2. {, K old-ab, { A, K old-ab } K }K A - forces the reuse of an old session key past the key s lifetime 2. What if identity is not used (encrypted) in message 2? Registered user X can masquerade as, and can make A believe it is communicating with - changes to X in message. - intercepts messages 3, 5 and generates correct responses, 6.. A, X 2. {, K ax, { A, K ax } K X }K A 3. { A, K ax } K x What if A repeatedly requests a session with from AS? A obtains known plaintext-ciphertext pairs < K i ab, { A, Ki ab }K >, i=,..., n and performs cryptanalysis to discover s secret key K. Countermeasures: () replace { A, K i ab }K with { TK i } K { A, Ki ab }TK i where TK i is a temporary key unknown to A. (2) use { confounder i, A, K i ab }K instead of { A, Ki ab }K where confounder i is a (pseudo) random number.. What if intruder X discovers K ab ( but not K A or K )? Intruder X can masquerade as A, and can make believe it is communicating with A - replays message { A, K ab } K - knows f = I -, and generates correct response 5. This vulnerability was pointed out by Denning and Sacco in 98

7 Denning and Sacco s Protocol (98) Same assumptions as Needham s and Schroeder s. In addition, T = timestamp is generated by AS, and all clocks are tightly synchronized; i.e., CLOCK i -T < t + t 2, for all i = A,, and where t = discrepancy between local clocks and AS clock t 2 = network delay. A -> AS : A, 2. AS -> A : {, K ab, T, { A, K ab,t } K }K A 3. A -> : { A, K ab,t } K. -> A : { I } K ab 5. A - > : { I - } K ab Limited lifetime of { A, K ab,t } K has the following consequences: the ticket { A, K ab,t } K cannot be replayed (or reused) an intruder that discovers K ab cannot masquerade as A However, network delays or out-of-synch local clocks can cause denial of service and lifetime limit for K ab cannot be enforced by ticket { A, K ab,t } K (no lifetime limit) ticket { A, K ab,t } K cannot be cached and reused by A.

8 Kerberos V (MIT ) Login and Peer-to-Peer/ Client-Server Authentication A AS K a-tgs TGS <A, KA > <, K > <TGS, K TGS > TGS 2 3 A K ab KDC A 5 6. AS_REQ : A, T a, lifetime, TGS 2. AS_REP: A, T a, expr_time, { K a-tgs, TGS, expr_time, { Ticket a-tgs } K TGS, T a }K A where Ticket a-tgs = < K a-tgs, lifetime, T kdc, TGS > 3. TGS_REQ : { Ticket a-tgs } K TGS, { authenticator a-tgs }K a-tgs, T a2, lifetime 2, where authenticator a-tgs = < A, checksum, T a2 >. TGS_REP : A, T a2, expr_time 2, { K ab,, expr_time 2, { Ticket ab } K, T a2 }K a-tgs where Ticket ab = < K ab, lifetime 2, T kdc2, > 5. AP_REQ : { Ticket ab } K, { authenticator ab }K ab (for one-way authentication) where authenticator ab = < A, checksum 2, T a3 > 6. AP_REP : { checksum 2 + } K ab = OPTIONAL (for mutual authentication)

9 Credential Establishment and Cache Credential cache is held in a file accessible only by the user s processes. Cache entries are filled by the execution of messages - of Kerberos. Cache entry structure returned by get_cred. Client A s credential cache TGS credential (service) s name (service) s instance (service) s realm session key K ab service credential ticket lifetime key version number ticket ticket issue date (client) A s name (client) A s instance

10 Key Version Numbers (krb v ) Motivation: oth users and servers change their keys over time. (e.g., passwords, server keys). Outstanding tickets may exist which are encrypted with old key. Unless servers remember old keys, communication fails. Failed communication cannot always be reinitiated (e.g., batch applications fail). Approach: Maintain a version number for each key. Servers responsibility to save keys with older version numbers. Tickets and protocol messages only include the expected key version number. Maximum number of old keys do not typically exceed two to three. (max. life of a K V ticket is about 2 hours plus max. KDC update delay; exception: long-life patches allowing one-month tickets) Limitation: Password updates may not propagate to all slaves instantaneously. User logins transparently directed to a KDC slave may fail for a until password updates propagate to KDC slaves. Users must remember previous password (e.g., previous version).

11 Network-Layer Addresses in Tickets Motivation:Theft of credential cache entries (i.e., tickets and corresponding session keys) use of stolen tickets and session keys from foreign network locations Situation: unattended workstations, root privileges to someone else s system Note: Theft of tickets and authenticators alone by an intruder does not give the intruder a ticket s session key Nevertheless, theft of tickets and authenticators can be a threat for all applications that do not use the session key and detect attack beyond initial authentication. Approach: Place ticket user s network-layer (e.g., IP) address in ticket. (Why not in authenticator?) Limitations: Approach disallows legitimate delegation of credentials. Network-layer addresses can be faked without great difficulty.

12 KDC Replication Motivation: Avoid single point of failure and performance bottleneck Approach: Maintain a single Master KDC and multiple Slave KDCs. Master KDC is Readable / Writeable whereas Slave KDCs are Read-only. Slave KDCs are updated periodically by Master KDC, or by administrative command. Unencrypted file containing Master KDC database is downloaded to each Slave KDC Reason: Most KDC operations require Read-only access KDC updates are typically required for infrequent operations; e.g., add / delete users, change passwords. Threat: Unauthorized disclosure of users passwords. Unauthorized modification of user and account data - create / modify user accounts and their properties; - replace (encrypted) user s password entry with attacker s Protection: Maintain the integrity of the Master KDC file copy in transit. - compute a hash function of the Master KDC file copy. - send the hash function to each Slave KDC in a krb_safe message. Residual Threat: Ciphertext-only attack against the users password entries. Some user privacy concerns (e.g., user registration attributes).

13 Interrealm Authentication Key Sharing L.KDC K L-R R.KDC K A K A@L K Protocol Message Flows L.KDC R.KDC L.AS <A, K A > <, K > R.AS L.TGS < R.TGS, K L-R > < L.TGS, K L-R > R.TGS K A-R.TGS K ab A@L 8

14 Non-Transitive Authentication Trust (krb v) Key Sharing L.KDC K L-M M.KDC K M-R R.KDC K A K A@L K C@R Motivation: Penultimate, rogue KDC of a KDC chain (i.e., L.KDC) can impersonate both local and foreign users. Protection: User A.L s ticket for R.KDC ( i.e., K A-R.TGS ) includes realm name L, and is made by M.KDC ( i.e., encrypted with K M-R ). Realm R.KDC will refuse a ticket made by M.KDC for a foreign user (i.e., a user of L.KDC, or of any other realm but M.KDC). Limitation: Manage and protect O( n 2 ) shared cross-realm keys. Establish O( n 2 ) trust relations.

15 Encryption for Confidentiality and Integrity CC Encryption Mode Encryption and Decryption IV Requirements CC Invariant Property PCC Encryption Mode Encryption and Decryption PCC Invariant Property Data Encryption (for Confidentiality) Data Integrity

16 CC Encryption Mode Encryption : C n = { C n- P n } K, where C 0 = IV p p 2 p 3 p IV key EC-e EC-e EC-e EC-e c c 2 c 3 c Decryption : C n- {C n } K - = P n, where C 0 = IV c c 2 c 3 c key EC-d EC-d EC-d EC-d IV p p 2 p 3 p

17 CC Encryption Mode (ctnd) IV Requirements. IV Must be Secret ( and Random) Chosen Plaintext Attack: Let IV a, IV b be known, and K, P be secret. Choose X i such that { IV a X i } K = { IV b P } K Then, IV a IV b X i = P 2. IV Must be Selected / Changed per Association (e.g., per session) Chosen Plaintext Attack: Let IV be constant (but secret) and P be secret (but predictable). P has a few known values P, P2,..., Pn Steal { IV P } K and construct a table of 2 56 entries for each P i, each entry containing { IV Pi }Kj Find an entry s.t. { IV P } K = { IV P i }Kj and ( secret ) key K = Kj. 3. IV Must be Protected from Predictable Modification Modification Attack: Predictable change of IV[i] bit causes predictable change of P [i] bit, even if P is secret. C = { IV P } K => P [i] = IV [i] { C } K - [i] = IV [i] { C } [i] K -

18 CC Encryption Mode (ctnd) Encryption : C n = { C n- P n } K Decryption : K C n {C n+ } - = P n+ => modify P n+ [i] modify C n [i] C n- {C n } K - = P n => random P n CC Invariant Property IV p p 2 p i- p i p i+ p n c c 2 c i- c i c i+ c n Decompose Splice c c 2 c i- c i c i+ c n IV p IV s p p 2 p i- p i p i+ p n P = P IV p IV P i = C i- P i IV s

19 The Cipher Feedback (CF) mode of the DES Synchronized 6-bit shift register inputs (initial value from IV) Key DES (Encipher) DES (Encipher) Key CLEARTEXT CIPHERTEXT CLEARTEXT

20 PCC Encryption Mode Encryption : C n = {C n- P n- P n } K, where C 0 =IV, P 0 = 0 p p 2 p 3 p IV key EC-e EC-e EC-e EC-e c c 2 c 3 c Decryption : C P n- {C n } = P n, where C 0 =IV, P 0 = 0 K - n- c c 2 c 3 c key EC-d EC-d EC-d EC-d IV p p 2 p 3 p

21 PCC Encryption Mode (ctnd) Encryption : C n = {C n- P n- P n } K Decryption : {C n } K- C n- => random P n P n- = P n modify C n [i] K - C n P n {C n+ } = P n+ => random P n+ => random P n+m PCC Invariant Property IV p p 2 p i- p i p i+ p n c c 2 c i- c i c i+ c n Decompose Splice c c 2 c i- c i c i+ c n IV p IV s p p 2 p i- p i p i+ p n P = P IV p IV P i = C i- P i P i- IV s

22 Data Encryption (for Confidentiality) krb_priv Kv priv length(encr) kv priv length(encr) length data 5 ms t-stamp sender IP-addr d t-stamp pad key IV P PCC ENC C kv priv length(encr) length data 5 ms t-stamp sender IP-addr d t-stamp pad

23 Data Integrity krb_safe Kv safe length(data) data 5 ms t-stamp sender IP-addr d t-stamp pad K ab cksum Kv safe length(data) data 5 ms t-stamp sender IP-addr d t-stamp cksum

24 Kerberos V Replay Detection (sliding time window w/o server replay cache) A s clock (fast) A s clock (loosely synchronized) A s (client s) clock (slow) s (server s) clock reject C 3 (t) Ti (server) must maintain replay cache reply C S (t)+5 min T 0 T C 2 (t) Tj C S (t) T 2 T 3 C S (t)-5 min reject C (t) Tk

25 Out-of-Synch Clocks Server 2 s clock Client A s clock Server s clock Ti C (t)+5 min T 0 T C (t) T 2 T 3 reject C (t)-5 min reject C A (t j ) Tj Q 0 C 2 (t)+5 min Ti C A (t i ) Q Q 2 Q 3 C 2 (t) C 2 (t)-5 min

26 Kerberos V Message Formats

27 Ticket # bytes 8 A s (i.e., client s) name A s (i.e., client s) instance A s (i.e., client s) realm A s network-layer (e.g., IP) adddress session key for A <-> (i.e., K ab ) ticket lifetime (5 min. units) KDC timestamp (i.e., ticket issue time) s (i.e., server s) name s (i.e., server s) instance 7 pad of 0 s to make ticket length a multiple of 8 bytes

28 Authenticator # bytes 7 A s (i.e., client s) name A s (i.e., client s) instance A s (i.e., client s) realm checksum A s (i.e., client s) timestamp (5 millisec.) timestamp pad of 0 s to make ticket length a multiple of 8 bytes

29 Credential field of a AS_REP or TGS_REP # bytes 8 7 session key for A <-> (i.e., K s ab ) (i.e., server s) name s (i.e., server s) instance s (i.e., server s) realm A s network-layer (e.g., IP) adddress ticket lifetime s (i.e., server s) key version number ticket length ticket KDC timestamp (i.e., ticket issue time) pad of 0 s to make cred. length a multiple of 8 bytes

30 AS_REQ # bytes Kerberos version () message type () A s (i.e., client s) name A s (i.e., client s) instance A s (i.e., client s) realm A s (i.e., client s) timestamp requested ticket lifetime s (i.e., server s) name s (i.e., server s) instance

31 TGS_REQ # bytes variable variable Kerberos version () message type (3) KDC s key version number KDC s realm length of TGT length of authenticator TGT authenticator A s (i.e., client s) timestamp requested ticket lifetime s (i.e., server s) name s (i.e., server s) instance TGT

32 AS_REP and TGS_REP # bytes Kerberos version () message type (2) A s (i.e., client s) name A s (i.e., client s) instance A s (i.e., client s) realm A s (i.e., client s) timestamp number of tickets () variable 2 ticket expiration time A s (i.e., client s) key version number credential length credential

33 AP_REQ # bytes variable variable Kerberos version () message type (8) s (i.e., server s) key version number s (i.e., server s) realm length of ticket length of authenticator ticket authenticator # bytes AP_REP - optional Kerberos version () message type (6) length of encrypted material () A s authenticator s checksum + # bytes AP_ERR Kerberos version () message type (8) error code error text (additional information)

34 KDC Error Reply # bytes Kerberos version () message type (32) A s (i.e., client s) name A s (i.e., client s) instance A s (i.e., client s) realm A s (i.e., client s) timestamp error code error text (additional information)

35 KR_PRIV # bytes variable Kerberos version () message type (6) length of encrypted material (e.g., data) length of data data A s (i.e., client s) timestamp (5 millisec.) variable D A s (i.e., client s) network-layer (i.e., IP) address timestamp pad of 0 s to make length a multiple of 8 bytes

36 KR_SAFE # bytes variable 6 Kerberos version () message type (7) length of data data A s (i.e., client s) timestamp (5 millisec.) A s (i.e., client s) network-layer (i.e., IP) address D timestamp (pseudo-jueneman) checksum

37 Laboratory Notes KDC Installation

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative

More information

Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications

Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications CSE565: Computer Security Lectures 16 & 17 Authentication & Applications Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 Lec 16.1 Acknowledgments Material for some

More information

Trusted Intermediaries

Trusted Intermediaries AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security. Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:

More information

Overview of Kerberos(I)

Overview of Kerberos(I) Overview of Kerberos(I) Network Authentication Protocol for C/S application based on symmetric cryptosystem TTP authentication service Based on secret key, single login Part of MIT's project Athena (public

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Authentication Applications We cannot enter into alliance with neighbouring princes until

More information

Cryptographic Checksums

Cryptographic Checksums Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;

More information

Network Working Group. C. Neuman ISI September 1993

Network Working Group. C. Neuman ISI September 1993 Network Working Group Request for Comments: 1510 J. Kohl Digital Equipment Corporation C. Neuman ISI September 1993 Status of this Memo The Kerberos Network Authentication Service (V5) This RFC specifies

More information

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued) Cryptology Part 1 Uses of Cryptology 1. Transmission of a message with assurance that the contents will be known only by sender and recipient a) Steganography: existence of the message is hidden b) Cryptography:

More information

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication Outline Security Handshake Pitfalls (Chapter 11 & 12.2) Login Only Authentication (One Way) Login i w/ Shared Secret One-way Public Key Lamport s Hash Mutual Authentication Shared Secret Public Keys Timestamps

More information

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011 Outline Introduction Shared-key Authentication Asymmetric authentication protocols

More information

Security and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models

Security and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models CS 645 Security and Privacy in Computer Systems Lecture 7 The Kerberos authentication system Last Week Security policy, security models, trust Access control models The Bell-La Padula (BLP) model The Biba

More information

Network Working Group Request for Comments: 4120 Obsoletes: 1510 Category: Standards Track K. Raeburn MIT July 2005

Network Working Group Request for Comments: 4120 Obsoletes: 1510 Category: Standards Track K. Raeburn MIT July 2005 Network Working Group Request for Comments: 4120 Obsoletes: 1510 Category: Standards Track C. Neuman USC-ISI T. Yu S. Hartman K. Raeburn MIT July 2005 Status of This Memo The Kerberos Network Authentication

More information

What did we talk about last time? Public key cryptography A little number theory

What did we talk about last time? Public key cryptography A little number theory Week 4 - Friday What did we talk about last time? Public key cryptography A little number theory If p is prime and a is a positive integer not divisible by p, then: a p 1 1 (mod p) Assume a is positive

More information

Network Security: Kerberos. Tuomas Aura

Network Security: Kerberos. Tuomas Aura Network Security: Kerberos Tuomas Aura Kerberos authentication Outline Kerberos in Windows domains 2 Kerberos authentication 3 Kerberos Shared-key protocol for user login authentication Uses passwords

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Security Handshake Pitfalls 1 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: Authenticate each other Establish sessions keys This process may

More information

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service

More information

Kerberos MIT protocol

Kerberos MIT protocol Kerberos MIT protocol December 11 th 2009 Amit Shinde Kerberos MIT protocol Motivation behind the design Overview of Kerberos Protocol Kerberized applications Attacks and Security analysis Q & A Motivations

More information

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni CSCI 667: Concepts of Computer Security Lecture 9 Prof. Adwait Nadkarni 1 Derived from slides by William Enck, Micah Sherr, Patrick McDaniel, Peng Ning, and Vitaly Shmatikov Authentication Alice? Bob?

More information

The Kerberos Authentication Service

The Kerberos Authentication Service The Kerberos Authentication Service By: Cule Stevan ID#: 0047307 SFWR 4C03 April 4, 2005 Last Revision: April 5, 2005 Stevan Cule 0047307 SOFTWARE ENGINEERING 4C03 WINTER 2005 The Kerberos Authentication

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Hello Challenge R f(k, R f(k, R Problems: 1. Authentication is not mutual only authenticates Anyone can send the challenge R. f(k, R Problems: 1. Authentication is not mutual only authenticates Anyone

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation Overview Key exchange Session vs. interchange keys Classical, public key methods Key generation Cryptographic key infrastructure Certificates Key storage Key escrow Key revocation Digital signatures May

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

Chapter 9: Key Management

Chapter 9: Key Management Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange

More information

Security issues in Distributed Systems

Security issues in Distributed Systems Security issues in Distributed Systems Is Kerberos the Answer? Types of Distributed Systems There are many different types of distributed computing systems and many challenges to overcome in successfully

More information

ISSN: EverScience Publications 149

ISSN: EverScience Publications 149 An Eager Strategy for TGT Generation at Client Side for Kerberos Protocol Deepika Yadav M.Tech Scholar, B.S.Anangpuria Institute of Technology &Management, Faridabad. Dr. A.K.Sharma Dean & Prof., Department

More information

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L7: Key Distributions Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 9/16/2015 CSCI 451 - Fall 2015 1 Acknowledgement Many slides are from or are

More information

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 3.3: Security Handshake Pitfalls CSC 474/574 Dr. Peng Ning 1 Authentication Handshakes Secure communication almost always includes an initial authentication

More information

March 26, Abstract

March 26, Abstract Public-key Cryptography Extensions into Kerberos Ian Downard University of Missouri Rolla Department of Electrical and Computer Engineering 1870 Miner Circle Rolla, MO 65409 Phone: 573-341-8422 Fax: 573-341-4532

More information

Authentication Handshakes

Authentication Handshakes AIT 682: Network and Systems Security Topic 6.2 Authentication Protocols Instructor: Dr. Kun Sun Authentication Handshakes Secure communication almost always includes an initial authentication handshake.

More information

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols CIS 6930/4930 Computer and Network Security Topic 6.2 Authentication Protocols 1 Authentication Handshakes Secure communication almost always includes an initial authentication handshake. Authenticate

More information

BACHELOR THESIS CAPABILITY OF KERBEROS MATTHIJS MEKKING

BACHELOR THESIS CAPABILITY OF KERBEROS MATTHIJS MEKKING BACHELOR THESIS CAPABILITY OF KERBEROS MATTHIJS MEKKING JUNE 2006 Contents 1 Introduction 5 1.1 Outline.................................. 5 2 The Kerberos Protocol 7 2.1 Term definitions.............................

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Cryptographic Authentication Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

User Authentication Protocols Week 7

User Authentication Protocols Week 7 User Authentication Protocols Week 7 CEN-5079: 2.October.2017 1 Announcement Homework 1 is posted on the class webpage Due in 2 weeks 10 points (out of 100) subtracted each late day CEN-5079: 2.October.2017

More information

Elements of Security

Elements of Security Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 8, 2015 at 12:47 Slideset 7: 1 Car Talk Puzzler You have a friend in a police state

More information

User Authentication Protocols

User Authentication Protocols User Authentication Protocols Class 5 Stallings: Ch 15 CIS-5370: 26.September.2016 1 Announcement Homework 1 is due today by end of class CIS-5370: 26.September.2016 2 User Authentication The process of

More information

Spring 2010: CS419 Computer Security

Spring 2010: CS419 Computer Security Spring 2010: CS419 Computer Security Vinod Ganapathy Lecture 7 Topic: Key exchange protocols Material: Class handout (lecture7_handout.pdf) Chapter 2 in Anderson's book. Today s agenda Key exchange basics

More information

Network Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions

Network Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions CHAPTER 3 Network Security Solutions to Review Questions and Exercises Review Questions. A nonce is a large random number that is used only once to help distinguish a fresh authentication request from

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

In any of these cases, an unauthorized user may be able to gain access to services and data that he or she is not authorized to access.

In any of these cases, an unauthorized user may be able to gain access to services and data that he or she is not authorized to access. e-pgpathshala Subject: Computer Science Paper: Cryptography and Network Security Module: Authentication Application Kerberos Module No: CS/CNS/31 Quadrant 1 e-text Learning Objectives To introduce authentication

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

Authentication in real world: Kerberos, SSH and SSL. Zheng Ma Apr 19, 2005

Authentication in real world: Kerberos, SSH and SSL. Zheng Ma Apr 19, 2005 Authentication in real world: Kerberos, SSH and SSL Zheng Ma Apr 19, 2005 Where are we? After learning all the foundation of modern cryptography, we are ready to see some real world applications based

More information

Kerberos V5. Raj Jain. Washington University in St. Louis

Kerberos V5. Raj Jain. Washington University in St. Louis Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 11-1

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following: 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2017 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

Contents Digital Signatures Digital Signature Properties Direct Digital Signatures

Contents Digital Signatures Digital Signature Properties Direct Digital Signatures Contents Digital Signatures... 197 Digital Signature Properties... 198 Direct Digital Signatures... 198 199...قابلداوری Arbitrated Digital Signatures Arbitrated Digital Signature Technaiques... 200 Authentication

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005 Chapter 7: Security From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4 Introduction Security policies Provide for the sharing of resources within specified limits

More information

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper

More information

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008 Kerberos Pehr Söderman Pehrs@kth.se Natsak08/DD2495 CSC KTH 2008 Project Athena Started 1983 at MIT 10 000 workstations 1000 servers Unified enviroment Any user, any workstation, any server, anywhere...

More information

Public-key cryptography extensions into. Kerberos

Public-key cryptography extensions into. Kerberos ow can and why H should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are the questions that we explore in this article. Integrating public-key cryptography

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!? 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2018 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

Network Security: Classic Protocol Flaws, Kerberos. Tuomas Aura

Network Security: Classic Protocol Flaws, Kerberos. Tuomas Aura Network Security: Classic Protocol Flaws, Kerberos Tuomas Aura Outline Classic key-exchange protocols and flaws Kerberos authentication Kerberos in Windows domains 2 Classic key-exchange protocols and

More information

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols Cryptographic Protocols Topics 1. Dramatis Personae and Notation 2. Session and Interchange Keys 3. Key Exchange 4. Key Generation 5. Cryptographic Key Infrastructure 6. Storing and Revoking Keys 7. Digital

More information

CSC 482/582: Computer Security. Security Protocols

CSC 482/582: Computer Security. Security Protocols Security Protocols Topics 1. Basic Concepts of Cryptography 2. Security Protocols 3. Authentication Protocols 4. Key Exchange Protocols 5. Kerberos 6. Public Key Infrastructure Encryption and Decryption

More information

Network Security (NetSec)

Network Security (NetSec) Chair of Network Architectures and Services Department of Informatics Technical University of Munich Network Security (NetSec) IN2101 WS 17/18 Prof. Dr.-Ing. Georg Carle Dr. Heiko Niedermayer Cornelius

More information

AUTHENTICATION APPLICATION

AUTHENTICATION APPLICATION AUTHENTICATION APPLICATION WHAT IS KERBEROS? Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography.

More information

Cryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols

Cryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols Cryptography and Network Security Chapter 13 Digital Signatures & Authentication Protocols Digital Signatures have looked at message authentication but does not address issues of lack of trust digital

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Kerberos Introduction. Jim Binkley-

Kerberos Introduction. Jim Binkley- Kerberos Introduction Jim Binkley- jrb@cs.pdx.edu 1 outline intro to Kerberos (bark, bark) protocols Needham Schroeder K4 K5 miscellaneous issues conclusion 2 Kerberos history Kerberos came from MIT part

More information

"When you have crossed the river and have advanced a little further, some aged women weaving at the loom will beg you to lend a hand for a short

When you have crossed the river and have advanced a little further, some aged women weaving at the loom will beg you to lend a hand for a short KERBEROS: the fierce watchdog of Haides, depicted as a three headed dog with a serpent's tail, a mane of snakes, and a lion's claws. "And before them a dreaded hound, on watch, who has no pity, but a vile

More information

6. Security Handshake Pitfalls Contents

6. Security Handshake Pitfalls Contents Contents 1 / 45 6.1 Introduction 6.2 Log-in Only 6.3 Mutual Authentication 6.4 Integrity/Encryption of Data 6.5 Mediated Authentication (with KDC) 6.6 Bellovin-Merrit 6.7 Network Log-in and Password Guessing

More information

Key Management CS461/ECE422

Key Management CS461/ECE422 Key Management CS461/ECE422 1 Reading Chapter 10 in Computer Security: Art and Science Handbook of Applied Cryptography http://www.cacr.math.uwaterloo.ca/hac/ Section 11.3.2 attack on RSA signature Section

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

INFSCI 2935: Introduction of Computer Security 1. Courtesy of Professors Chris Clifton & Matt Bishop. INFSCI 2935: Introduction to Computer Security 2

INFSCI 2935: Introduction of Computer Security 1. Courtesy of Professors Chris Clifton & Matt Bishop. INFSCI 2935: Introduction to Computer Security 2 Digital Signature Introduction to Computer Security Lecture 7 Digital Signature October 9, 2003 Construct that authenticates origin, contents of message in a manner provable to a disinterested third party

More information

This chapter examines some of the authentication functions that have been developed to support network-based use authentication.

This chapter examines some of the authentication functions that have been developed to support network-based use authentication. 1 This chapter examines some of the authentication functions that have been developed to support network-based use authentication. In most computer security contexts, user authentication is the fundamental

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Cryptographic Authentication Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

Key distribution and certification

Key distribution and certification Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must be ensured. Problem solution: Certification Authority

More information

13/10/2013. Kerberos. Key distribution and certification. The Kerberos protocol was developed at MIT in the 1980.

13/10/2013. Kerberos. Key distribution and certification. The Kerberos protocol was developed at MIT in the 1980. Key distribution and certification Kerberos In the case of public key encryption model the authenticity of the public key of each partner in the communication must be ensured. Problem solution: Certification

More information

Key Establishment. Chester Rebeiro IIT Madras. Stinson : Chapter 10

Key Establishment. Chester Rebeiro IIT Madras. Stinson : Chapter 10 Key Establishment Chester Rebeiro IIT Madras CR Stinson : Chapter 10 Multi Party secure communication C D A B E F N parties want to communicate securely with each other (N=6 in this figure) If sends a

More information

CS Protocol Design. Prof. Clarkson Spring 2017

CS Protocol Design. Prof. Clarkson Spring 2017 CS 5430 Protocol Design Prof. Clarkson Spring 2017 Review Cryptography: Encryption, block ciphers, block cipher modes, MACs, cryptographic hash functions, digital signatures, authenticated encryption,

More information

Network Security. Kerberos and other Frameworks for Client Authentication. Dr. Heiko Niedermayer Cornelius Diekmann. Technische Universität München

Network Security. Kerberos and other Frameworks for Client Authentication. Dr. Heiko Niedermayer Cornelius Diekmann. Technische Universität München Network Security Kerberos and other Frameworks for Client Authentication Dr. Heiko Niedermayer Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: January

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 37 Chapter 9: Symmetric Key Distribution To understand the problems associated with managing and distributing secret keys.

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Chapter 4 Authentication Applications

Chapter 4 Authentication Applications Chapter 4 Authentication Applications Henric Johnson Blekinge Institute of Technology,Sweden http://www.its.bth.se/staff/hjo/ henric.johnson@bth.se Henric Johnson 1 Outline Security Concerns Kerberos X.509

More information

CHAPTER 3. ENHANCED KERBEROS SECURITY: An application of the proposed system

CHAPTER 3. ENHANCED KERBEROS SECURITY: An application of the proposed system CHAPTER 3 ENHANCED KERBEROS SECURITY: An application of the proposed system 3.1 Introduction Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Authentication in Distributed Systems

Authentication in Distributed Systems Authentication in Distributed Systems Introduction Crypto transforms (communications) security problems into key management problems. To use encryption, digital signatures, or MACs, the parties involved

More information

Fall 2010/Lecture 32 1

Fall 2010/Lecture 32 1 CS 426 (Fall 2010) Key Distribution & Agreement Fall 2010/Lecture 32 1 Outline Key agreement without t using public keys Distribution of public keys, with public key certificates Diffie-Hellman Protocol

More information

Network Working Group. Category: Informational Cisco Systems J. Brezak Microsoft February 2002

Network Working Group. Category: Informational Cisco Systems J. Brezak Microsoft February 2002 Network Working Group Request for Comments: 3244 Category: Informational M. Swift University of Washington J. Trostle Cisco Systems J. Brezak Microsoft February 2002 Status of this Memo Microsoft Windows

More information

Digital Signatures. Secure Digest Functions

Digital Signatures. Secure Digest Functions Digital Signatures Secure Digest Functions 8 requirements for one-way hash functions given M, H(M) is easy to compute given H(M), M is difficult to compute given M, it is difficult to find M such that

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

KEY DISTRIBUTION AND USER AUTHENTICATION

KEY DISTRIBUTION AND USER AUTHENTICATION KEY DISTRIBUTION AND USER AUTHENTICATION Key Management and Distribution No Singhalese, whether man or woman, would venture out of the house without a bunch of keys in his hand, for without such a talisman

More information

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class 1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and

More information

Persistent key, value storage

Persistent key, value storage Persistent key, value storage In programs, often use hash tables - E.g., Buckets are an array of pointers, collision chaining For persistant data, minimize # disk accesses - Traversing linked lists is

More information

T Cryptography and Data Security

T Cryptography and Data Security T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use

More information

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken 0/41 Alice Who? Authentication Protocols Andreas Zeller/Stephan Neuhaus Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken The Menu 1/41 Simple Authentication Protocols The Menu 1/41 Simple

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Datasäkerhetsmetoder föreläsning 7

Datasäkerhetsmetoder föreläsning 7 Datasäkerhetsmetoder föreläsning 7 Nyckelhantering Jan-Åke Larsson Cryptography A security tool, not a general solution Cryptography usually converts a communication security problem into a key management

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Information Security & Privacy

Information Security & Privacy IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 2 Sept 4, 2013 Key Management Network Security 1 Objectives Understand/explain the issues related to, and

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Verteilte Systeme (Distributed Systems)

Verteilte Systeme (Distributed Systems) Verteilte Systeme (Distributed Systems) Lorenz Froihofer l.froihofer@infosys.tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ VerteilteSysteme/ Security Threats, mechanisms, design issues

More information

KEY DISTRIBUTION AND USER AUTHENTICATION

KEY DISTRIBUTION AND USER AUTHENTICATION PART 2: NETWORK SECURITY APPLICATIONS KEY DISTRIBUTION AND USER AUTHENTICATION 4.1 Symmetric Key Distribution Using Symmetric Encryption 4.2 Kerberos Kerberos Version 4 Kerberos Version 5 4.3 Key Distribution

More information