authentication protocol
authentication protocol
y and
Network
Security
Sixth Edition
by William Stallings
Chapter 15
User Authentication
“Badges? We ain’t got no badges!
We don’t need no badges! I don’t
have to show you any stinking
badges!”
Verificatio
• Presenting an n step
identifier to the • Presenting or
security system generating
authentication
information that
Identificati corroborates the
on step binding between the
entity and the identifier
Means of User
Authentication
Something the individual Something the individual
knows possesses
• Examples include a password, • Examples include
a personal identification cryptographic keys, electronic
number (PIN), or answers to a are keycards,
There four
smart cards, and
prearranged set of questions physical
general means of keys
• This
authenticating a is referred to as a token
user’s identity,
which can be used
alone or in
combination
Something the individual is Something the individual
(static biometrics) does (dynamic biometrics)
• Examples include recognition • Examples include recognition
by fingerprint, retina, and by voice pattern, handwriting
face characteristics, and typing
rhythm
• Timestamps
• Requires that clocks among the various participants be synchronized
• Party A accepts a message as fresh only if the message contains a
timestamp that, in A’s judgment, is close enough to A’s knowledge
of current time
• Challenge/response
• Party A, expecting a fresh message from B, first sends B a nonce
(challenge) and requires that the subsequent message (response)
One-Way
Authentication
One application for
which encryption is A second requirement
growing in popularity is is that of
electronic mail (e- authentication
mail)
• Header of the e-mail • The recipient wants some
message must be in the assurance that the
clear so that the message is from the
message can be handled alleged sender
by the store-and-forward
e-mail protocol, such
as SMTP or X.400
• The e-mail message
should be encrypted such
that the mail-handling
system is not in
possession of the
decryption key
Remote User-Authentication
Using Symmetric Encryption
A two-level hierarchy of symmetric keys
can be used to provide confidentiality
for communication in a distributed
environment
• Strategy involves the use of a trusted key
distribution center (KDC)
• Each party shares a secret key, known as a
master key, with the KDC
• KDC is responsible for generating keys to
be used for a short time over a connection
between two parties and for distributing
those keys using the master keys to protect
the distribution
Needham and
Schroeder
Suppress-Replay
Attacks
• The Denning protocol requires reliance on clocks
that are synchronized throughout the network
• A risk involved is based on the fact that the
distributed clocks can become unsynchronized as a
result of sabotage on or faults in the clocks or the
synchronization mechanism
• The problem occurs when a sender’s clock is ahead
of the intended recipient’s clock
• An opponent can intercept a message from the
sender and replay it later when the timestamp in the
message becomes current at the recipient’s site
• Such attacks are referred to as suppress-replay
attacks
Counter measures
suppress replay
attack
Kerberos
• Authentication service developed as part of Project Athena at
MIT
• A workstation cannot be trusted to identify its users correctly
to network services
• A user may gain access to a particular workstation and pretend
to be another user operating from that workstation
• A user may alter the network address of a workstation so that
the requests sent from the altered workstation appear to come
from the impersonated workstation
• A user may eavesdrop on exchanges and use a replay attack to
gain entrance to a server or to disrupt operations
Transpar
Scalable
ent
• Ticket
• Created once the AS accepts the user as authentic; contains the
user’s ID and network address and the server’s ID
• Encrypted using the secret key shared by the AS and the server
• A service or user A
service
that is known to An
or user
instan
the Kerberos ce name
name
system
A
realm
• Identified by its name
principal name
Three parts of a
principal name
Differences Between
Versions 4 and 5
Version 5 is intended to
address the limitations of
version 4 in two areas:
Environmental Technical deficiencies
shortcomings • Double encryption
• Encryption system • PCBC encryption
dependence • Session keys
• Internet protocol dependence • Password attacks
• Message byte ordering
• Ticket lifetime
• Authentication forwarding
Encryption system
dependence
• Kerberos version 4 relied on a single
encryption algorithm (DES) that became
restricted and potentially weak.
Kerberos
Version 5
Flags