1. Trang chủ
  2. » Công Nghệ Thông Tin

Authentication Services pdf

23 127 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 23
Dung lượng 226 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Authentication ApplicationsWe cannot enter into alliance with neighbouring princes until we are acquainted with their designs... Authentication Applications will consider authentication

Trang 1

Authentication Applications

We cannot enter into alliance with neighbouring princes until we are acquainted with their designs.

The Art of War , Sun Tzu

Trang 2

Authentication Applications

 will consider authentication functions

 developed to support

application-level authentication & digital

signatures

 will consider Kerberos – a

private-key authentication service

 then X.509 directory authentication service

Trang 3

 trusted key server system from MIT

 provides centralised private-key

third-party authentication in a

distributed network

distributed through network

server

 two versions in use: 4 & 5

Trang 4

Kerberos Requirements

requirements as:

enough information to impersonate the user

unusable if Kerberos isn’t available

presence

scheme using a protocol proposed by

Needham-Schroeder (NEED78)

Trang 5

Kerberos 4 Overview

credential (ticket-granting ticket TGT)

services from TGS on basis of users TGT

Trang 6

Kerberos 4 Overview

Trang 7

Kerberos Realms

servers must share keys and trust

Trang 8

Kerberos Version 5

ticket lifetime, authentication forwarding, inter-realm authentication

session keys, password attacks

Trang 9

X.509 Authentication Service

standards

recommended

Trang 10

X.509 Certificates

containing:

by CA

Trang 11

X.509 Certificates

Trang 12

Obtaining a Certificate

 any user with access to the public

key of the CA can verify the user

public key that was certified

 only the CA can modify a certificate without being detected

 cannot be forged, certificates can be placed in a public directory

Trang 13

CA Hierarchy

they are assumed to know its public key

hierarchy to validate other CA's

and parent (backward)

one CA by users of all other CAs in

hierarchy

Trang 14

CA Hierarchy Use

Trang 15

Certificate Revocation

eg:

CRL

Trang 17

 a nonce is a parameter that varies with time A nonce can be a time

stamp, a visit counter on a Web

page, or a special marker intended

to limit or prevent the unauthorized replay or reproduction of a file

Trang 18

attack can be tolerated the server can use time nonce values which will not be honored for a second use This requires the overhead of the server remembering which nonce values

one-have been used until the nonce time-stamp

(and hence the digest built with it) has

expired, but it effectively protects against

replay attacks.

Trang 19

been sent multiple times)

 message must include timestamp,

nonce, B's identity and is signed by A

Trang 20

Two-Way Authentication

 Two messages (A->B, B->A) which also establishes in addition:

 reply includes original nonce from A, also timestamp and nonce from B

Trang 21

Three-Way Authentication

 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks

 has reply from A back to B containing

a signed copy of nonce from B

 means that timestamps need not be

checked or relied upon

Trang 22

X.509 Version 3

information is needed in a certificate

general extension method was defined

Trang 23

Certificate Extensions

 key and policy information

plus indicators of certificate policy

 certificate subject and issuer

attributes

formats for certificate subject and/or

issuer

 certificate path constraints

by other CA’s

Ngày đăng: 15/03/2014, 17:20

TỪ KHÓA LIÊN QUAN