Key Management-Kerberos and PKI
Key Management-Kerberos and PKI
Compiled by
Dr. Avita Katal
Assistant Professor(SG)
School of Computer Science
UPES,Dehradun
15.1
Chapter 15
Objectives
To explain the need for a key-distribution center
To show how a KDC can create a session key
To describe Kerberos as a KDC and an
authentication protocol
To explain the need for certification authorities
for public keys
To introduce the idea of a Public-Key
Infrastructure (PKI) and explain some of its duties
15.2
15-1 SYMMETRIC-KEY DISTRIBUTION
15.4
15.1.1 Continued
15.5
15.1.1 Continued
Hierarchical Multiple KDCs
15.6
15.1.2 Session Keys
A KDC creates a secret key for each member. This secret
key can be used only between the member and the KDC,
not between two members.
Note
A session symmetric key between two parties is
used only once.
15.7
15.1.2 Continued
A Simple Protocol Using a KDC
Figure 15.4 First approach using KDC
15.8
15-2 KERBEROS
A backbone
Kerberos is an network allows protocol,
authentication several and
LANs to same
at the be
connected.
time a KDC, In that
a backbone
has become network, no station
very popular. is
Several
directly connected
systems, includingto Windows
the backbone;
2000,the use
stations are
Kerberos.
part of a LAN,
Originally and the
designed backbone
at MIT, connects
it has the LANs.
gone through several
versions.
15.10
15.2.1 Continued
Real Server
The real server (Bob) provides services for the user
(Alice).
15.11
15.2.2 Operation
Figure 15.8 Kerberos example
15.12
15.2.3 Using Different Servers
15.13
15.2.4 Kerberos Version 5
15.14
15.2.5 Realms
15.15
15-3 PUBLIC-KEY DISTRIBUTION
15.17
15.3.2 Trusted Center
Figure 15.14 Trusted center
15.18
15.3.3 Controlled Trusted Center
Figure 15.15 Controlled trusted center
15.19
15.3.4 Certification Authority
Figure 15.16 Certification authority
15.20
15.3.5 X.509
Certificate
Figure 15.17 shows the format of a certificate.
15.21
15.3.5 Continued
Certificate Renewal
Each certificate has a period of validity. If there is no
problem with the certificate, the CA issues a new
certificate before the old one expires.
Certificate Renewal
In some cases a certificate must be revoked before its
expiration.
Delta Revocation
To make revocation more efficient, the delta certificate
revocation list (delta CRL) has been introduced.
15.22
15.3.6 Public-Key Infrastructures (PKI)
15.23
15.3.6 Continued
Trust Model
15.24