Unit 9
Unit 9
Security
(3170720)
UNIT 9: REMOTE USER AUTHENTICATION WITH SYMMETRIC
AND ASYMMETRIC ENCRYPTION, KERBEROS
REFERENCE BOOK- CRYPTOGRAPHY AND NETWORK
SECURITY, PRINCIPLES AND PRACTICE SIXTH EDITION,
WILLIAM STALLINGS, PEARSON
CHAPTER -15
Road Map
Modified Version
Old Version
Remote user authentication with
Asymmetric encryption
Mutual Authentication
Public-key encryption for session key distribution
• Assumes each of the two parties is in possession of the
current public key of the other
• May not be practical to require this assumption
Denning protocol using timestamps
• Uses an authentication server (AS) to provide public-key
certificates
• Requires the synchronization of clocks
Mutual Authentication
Denning protocol using timestamps
• The central system is referred to as an authentication server
(AS), because it is not actually responsible for secret-key
distribution. the AS provides public-key certificates.
• The session key is chosen and encrypted by A; hence, there is
no risk of exposure by the AS.
• The timestamps protect against replays of compromised keys.
• This protocol is compact but, as before, requires the
synchronization of clocks
Mutual Authentication
Woo and Lam makes use of nonces
Step 1: A informs the KDC of its intention to establish a secure
connection with B.
Step 7: A retrieves the session key Ks, uses it to encrypt Nb, and
returns it to B. This last message assures B of A’s knowledge of the
session key.
Mutual Authentication
This seems to be a secure protocol that takes into account the various
attacks. However, the authors themselves spotted a flaw and
submitted a revised version of the algorithm. In steps 5 and 6 The
identifier of A, IDA, is added
Revised Version to the set of items encrypted
with the KDC’s private key
This binds the session key
Ks to the identities of the two
parties that will be engaged
in the session.
This inclusion of IDA
accounts for the fact that the
Old Version nonce value Na is considered
unique only among all
nonces generated by A, not
among all nonces generated
by all parties. Thus, it is the
pair {IDA, Na}that uniquely
identifies the connection
Care needed to ensure no protocol flaws request of A
One Way Authentication
Have public-key approaches for e-mail
• Encryption of message for confidentiality, authentication, or
both.
• These approaches require that either the sender know the
recipient’s public key (confidentiality), the recipient know the
sender’s public key (authentication), or both (confidentiality
plus authentication).
• The public-key algorithm must be applied once or twice to
what may be a long message
One Way Authentication
For confidentiality, encrypt message with one-time secret key,
and encrypt one-time secret key using public-key
This method guarantees that A cannot later deny having sent the message.
However, this technique is open to another kind of fraud. Bob composes a message to
his boss Alice that contains an idea that will save the company money.
He appends his digital signature and sends it into the e-mail system. Eventually, the
message will get delivered to Alice’s mailbox.
But suppose that Max has heard of Bob’s idea and gains access to the mail queue
before delivery. He finds Bob’s message, strips off his signature, appends his, and
requeues the message to be delivered to Alice.
Max gets credit for Bob’s idea.
To counter such a scheme, both the message and signature can be encrypted with the
recipient’s public key:
One Way Authentication
The previous two schemes require that B know A’s public key and be
convinced that it is timely.
An effective way to provide this assurance is the digital certificate,
Using TGT
3. Request Service
Ticket
4. Receive Service
Ticket
5. Get Service
Service Server
Authentication Protocol
Authentication Protocol
C V : TicketV | Authenticatorc
Authenticatorc = E(Kc, v, [IDC | ADC | TS5])
Authentication Protocol