Kerberos using public key cryptography

13
Kerberos using Public Key Cryptography Prepared By: Mehta Ishani 13MCSE005

description

Kerberos using public key cryptography

Transcript of Kerberos using public key cryptography

Page 1: Kerberos using public key cryptography

Kerberos using Public Key Cryptography

Prepared By: Mehta Ishani13MCSE005

Page 2: Kerberos using public key cryptography

Introduction Principle and Authentication Process of

Kerberos Adding public Key Cryptography to Kerberos Performance Analysis of different protocol Related Security Issues Conclusion

Contents

Page 3: Kerberos using public key cryptography

Kerberos is network authentication protocol.

Developed at MIT: two versions, Version 4 and Version 5

Introduction

Page 4: Kerberos using public key cryptography

Authentication Plain text - Cipher text Encryption – Decryption - Key secret-key cryptosystem public-key cryptosystem

Terminology

Page 5: Kerberos using public key cryptography

Principle and Authentication Process of Kerberos

Key Distribution Center (KDC)

ClientServer

Ticket Granting Server (TGS)

Page 6: Kerberos using public key cryptography

Limitation of kerberos Scalability

3 public key extensions to kerberosPublic key Cryptography for Initial

Authentication in Kerberos (PKINIT). Public Key Cryptography for Cross Realm �

Authentication in Kerberos (PKCROSS). Public Key Utilizing Tickets for Application �

Servers (PKTAPP).

Adding public Key Cryptography to Kerberos

Page 7: Kerberos using public key cryptography

Initial Authentication stages Initial TGT request to KDC. Public keys are

used to authenticate client and KDC Request a ticket to application server using

secret key encryption Authenticate to the application server using

secret key encryption

PKINIT

Page 8: Kerberos using public key cryptography

Initial secret key-based TGT request to KDC

Request a ticket to the remote TGS Public key authentication between KDCS to

establish a session key Request a ticket to the remote application

server (all secret key encryption) Authenticate to the remote application

server (all secret key encryption)

PKCROSS

Page 9: Kerberos using public key cryptography

Service request to the application server. Public keys are used to authenticate client and server.

Authenticate to the application service

PKTAPP

Page 10: Kerberos using public key cryptography

The main performance comparison is observed between PKCROSS and PKTAPP

Using some statistics it can be said that for authentication to a single application server, the no of private and public key operation for PKTAPP and PKCROSS are same.

But PKCROSS requires more secret key operations.

Performance Analysis of different protocol

Page 11: Kerberos using public key cryptography

The security of private keys and the wide spread availability of their corresponding public keys are the main security issues in public key cryptography.

Related Security Issues

Page 12: Kerberos using public key cryptography

PKINIT specification defines how public key cryptography can be used to secure the initial authentication procedure.

PKCROSS improves the scalability of Kerberos in large multi-realm networks where many application servers may be participating in the authentication process.

PKTAPP enhances Kerberos scalability by distributing the authentication workload from the centralized KDC to the individual principals on the network.

Conclusion

Page 13: Kerberos using public key cryptography

THANK YOU