Authentication Protocols

Similar documents
Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Authentication Handshakes

CSC 474/574 Information Systems Security

Network Security CHAPTER 31. Solutions to Review Questions and Exercises. Review Questions

Modelling and Analysing of Security Protocol: Lecture 1. Introductions to Modelling Protocols. Tom Chothia CWI

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

Security Handshake Pitfalls

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

CSCE 813 Internet Security Kerberos

6. Security Handshake Pitfalls Contents

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni

Formal Methods for Assuring Security of Computer Networks

Chapter 9: Key Management

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols

Trusted Intermediaries

AIT 682: Network and Systems Security

What did we talk about last time? Public key cryptography A little number theory

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

Security and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Security Handshake Pitfalls

CS3235 Seventh set of lecture slides

Session Key Distribution

Distributed Systems Principles and Paradigms

Security Handshake Pitfalls

Applied Cryptography Basic Protocols

Kerberos MIT protocol

Chapter 10 : Private-Key Management and the Public-Key Revolution

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange

Session key establishment protocols

CSC 482/582: Computer Security. Security Protocols

Lecture 1: Course Introduction

Session key establishment protocols

INFSCI 2935: Introduction of Computer Security 1. Courtesy of Professors Chris Clifton & Matt Bishop. INFSCI 2935: Introduction to Computer Security 2

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

CIS 4360 Secure Computer Systems Applied Cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptographic Checksums

Authentication Part IV NOTE: Part IV includes all of Part III!

UNIT - IV Cryptographic Hash Function 31.1

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

T Cryptography and Data Security

Test 2 Review. 1. (10 points) Timestamps and nonces are both used in security protocols to prevent replay attacks.

Chapter 10: Key Management

Computer Networks & Security 2016/2017

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Outline More Security Protocols CS 239 Computer Security February 4, 2004

CPSC 467b: Cryptography and Computer Security

Test 2 Review. (b) Give one significant advantage of a nonce over a timestamp.

COMP 249 Advanced Distributed Systems Multimedia Networking. Performance of Multimedia Delivery on the Internet Today

Acknowledgments. CSE565: Computer Security Lectures 16 & 17 Authentication & Applications

Cryptographic Protocols 1

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation

ISSN: EverScience Publications 149

Lecture 5: Protocols - Authentication and Key Exchange* CS 392/6813: Computer Security Fall Nitesh Saxena

Network Security Essentials

Distributed Systems Principles and Paradigms. Chapter 09: Security

Outline Key Management CS 239 Computer Security February 9, 2004

Network Security (NetSec)

Applied Cryptography and Computer Security CSE 664 Spring 2017

Network Security. Chapter 7 Cryptographic Protocols

CSC 774 Network Security

S. Erfani, ECE Dept., University of Windsor Network Security

CSC/ECE 774 Advanced Network Security

Network Security (NetSec)

Datasäkerhetsmetoder föreläsning 7

Password. authentication through passwords

Information Security CS 526

(More) cryptographic protocols

Secure User Authentication for Corporate Sector

KEY DISTRIBUTION AND USER AUTHENTICATION

CT30A8800 Secured communications

User Authentication Protocols Week 7

Network Security. Kerberos and other Frameworks for Client Authentication. Dr. Heiko Niedermayer Cornelius Diekmann. Technische Universität München

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Factotum Sep. 24, 2007

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Cryptography and Network Security

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Fall 2010/Lecture 32 1

Lecture 9. Authentication & Key Distribution

User Authentication Protocols

Computer Security. 10. Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

CPSC 467: Cryptography and Computer Security

Fall 2005 Joseph/Tygar/Vazirani/Wagner Final

Cryptography III Want to make a billion dollars? Just factor this one number!

Authentication in Distributed Systems

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Spring 2010: CS419 Computer Security

Today s Lecture. Secure Communication. A Simple Protocol. Remote Authentication. A Simple Protocol. Rules. I m Alice. I m Alice

Transcription:

COMP Distributed Systems Protocols Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill jeffay@cs.unc.edu October 5, 999 http://www.cs.unc.edu/~jeffay/courses/compf99 Protocols Concept u is concerned with the question Who said this?» Did smithfd@buzzard.cs.unc.edu really request this file? v Who made the request? v Is the request received actually the one made?» Did buzzard.cs.unc.edu really send me this file? v Which server sent the file? v Did I receive the file that was actually sent?» Is this message from Steve Weiss about my pay raise legit? v Are the contents of the message genuine? v Can Weiss deny he sent it?

Protocols Outline text E(key e, text) key e E D text key d u Classic Needham & Schroeder authentication model» Theory u Kerberos» Practice u How safe is safe?» Weaknesses in Kerberos Protocols Overview Get a session key and credentials u -Way authentication Perform mutual authentication u Variations on the theme» Remote authentication» -Way authentication u Concerns» State requirements» Susceptibility to replay attacks & corrupted keys Exchange messages Bob

-Way Using symmetric cryptography Step Obtain a session key (, Bob, random ). s key. Bob s key.... {random, Bob, session key, {session key, } Bob } Bob 5 -Way Using symmetric cryptography Step introduces herself to Bob {..., {session key, } Bob } {session key, } Bob {message} session key?? 6

-Way Using symmetric cryptography Step Bob challenges {random Bob } session key 5 {random Bob } session key 6 {message} session key?? 7 -Way Using symmetric cryptography What if allowed the session key to be stolen? {session key, } Bob {session key, } Bob {random Bob } session key 5 {random Bob } session key 8

-Way Communicating with untrusted parties Bob needs to challenge by requiring her to reauthenticate herself to the server (, Bob, random, {, random Bob } Bob ) {random, Bob, session key, {session key,, random Bob } Bob } {session key,, random Bob } Bob {, random Bob } Bob 9 -Way Communicating with untrusted parties Step 0 requests to communicate with Bob. s key. Bob s key.... ( ) {, random Bob } Bob 0

-Way Communicating with untrusted parties Step Obtain a session key (, Bob, random, {, random Bob } Bob ). s key. Bob s key.... {random, Bob, session key, {session key,, random Bob } Bob } {session key,, random Bob } Bob 5 Step authenticates herself to Bob -Way Using asymmetric cryptography Step Obtain Bob s public key (, Bob ). s public key. Bob s public key.... {Bob s public key, Bob } s Private Key

-Way Using asymmetric cryptography Step introduces herself to Bob {random, } Bob s public key -Way Using asymmetric cryptography Step Bob looks up. s public key. Bob s public key.... { s public key, } s Private Key 5 ( Bob, ) 6 {random, message} s public key??

-Way Using asymmetric cryptography Step Bob & authenticate themselves to each other {random, random Bob } s public key 6 7 {random Bob } Bob s public key 5 -Way Using asymmetric cryptography Step 5 & Bob exchange messages {{message} s private key, random Bob + n} Bob s public key {{message} Bob s private key, random + m} s public key 6

-Way Using asymmetric cryptography Did & Bob s messages have to be private? {message, random Bob + n} s private key {message, random + m} Bob s private key 7 Across Administrative Domains Symmetric cryptography s.. Local users users.. Remote s (, Bob, random ) {session key,, Bob, random } Inter- key a {session key,, Bob, random, {session key, } Bob } Inter- key b {random, Bob, session key, {session key, } Bob } Bob s.. Local users users.. Remote s Bob 8

Across Administrative Domains Asymmetric cryptography (, Bob ) Bob s.. Local users users.. Remote s {Bob s public key, Bob } s Private Key Bob 9 -Way Symmetric cryptography Step Obtain a message key (, Bob, random ). s key. Bob s key.... {random, Bob, session key, {session key, } Bob } Bob 0

-Way Symmetric cryptography Step communicates with Bob {session key, } Bob {timestamp, message} session key George Latest time stamp Latest time stamp -Way Asymmetric cryptography Step Obtain a message key. Õs key. BobÕs key.... (, Bob ) {Bob s public key, Bob } s Private Key Bob

-Way Asymmetric cryptography Step communicates with Bob {timestamp, random,, { Bob } s private key } Bob s public key {message, random } Bob s public key