Authentication ApplicationsWe cannot enter into alliance with neighbouring princes until we are acquainted with their designs... Authentication Applications will consider authentication
Trang 1Authentication Applications
We cannot enter into alliance with neighbouring princes until we are acquainted with their designs.
— The Art of War , Sun Tzu
Trang 2Authentication Applications
will consider authentication functions
developed to support
application-level authentication & digital
signatures
will consider Kerberos – a
private-key authentication service
then X.509 directory authentication service
Trang 3 trusted key server system from MIT
provides centralised private-key
third-party authentication in a
distributed network
distributed through network
server
two versions in use: 4 & 5
Trang 4Kerberos Requirements
requirements as:
enough information to impersonate the user
unusable if Kerberos isn’t available
presence
scheme using a protocol proposed by
Needham-Schroeder (NEED78)
Trang 5Kerberos 4 Overview
credential (ticket-granting ticket TGT)
services from TGS on basis of users TGT
Trang 6Kerberos 4 Overview
Trang 7Kerberos Realms
servers must share keys and trust
Trang 8Kerberos Version 5
ticket lifetime, authentication forwarding, inter-realm authentication
session keys, password attacks
Trang 9X.509 Authentication Service
standards
recommended
Trang 10X.509 Certificates
containing:
by CA
Trang 11X.509 Certificates
Trang 12Obtaining a Certificate
any user with access to the public
key of the CA can verify the user
public key that was certified
only the CA can modify a certificate without being detected
cannot be forged, certificates can be placed in a public directory
Trang 13CA Hierarchy
they are assumed to know its public key
hierarchy to validate other CA's
and parent (backward)
one CA by users of all other CAs in
hierarchy
Trang 14CA Hierarchy Use
Trang 15Certificate Revocation
eg:
CRL
Trang 17 a nonce is a parameter that varies with time A nonce can be a time
stamp, a visit counter on a Web
page, or a special marker intended
to limit or prevent the unauthorized replay or reproduction of a file
Trang 18attack can be tolerated the server can use time nonce values which will not be honored for a second use This requires the overhead of the server remembering which nonce values
one-have been used until the nonce time-stamp
(and hence the digest built with it) has
expired, but it effectively protects against
replay attacks.
Trang 19been sent multiple times)
message must include timestamp,
nonce, B's identity and is signed by A
Trang 20Two-Way Authentication
Two messages (A->B, B->A) which also establishes in addition:
reply includes original nonce from A, also timestamp and nonce from B
Trang 21Three-Way Authentication
3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks
has reply from A back to B containing
a signed copy of nonce from B
means that timestamps need not be
checked or relied upon
Trang 22X.509 Version 3
information is needed in a certificate
general extension method was defined
Trang 23Certificate Extensions
key and policy information
plus indicators of certificate policy
certificate subject and issuer
attributes
formats for certificate subject and/or
issuer
certificate path constraints
by other CA’s