You are on page 1of 26

Network

Security
Essentials

Fifth Edition

by William Stallings
Chapter 4
Key Distribution and User
Authentication
No Singhalese, whether man or woman, would
venture out of the house without a bunch of keys in
his hand, for without such a talisman he would fear
that some devil might take advantage of his weak state
to slip into his body.

—The Golden Bough, Sir James George Frazer


Symmetric Key Distribution
using symmetric encryption
• For symmetric encryption to work, the two parties to
an exchange must share the same key, and that key
must be protected from access by others

• Frequent key changes are usually desirable to limit the


amount of data compromised if an attacker learns the
key

• Key distribution technique


• The means of delivering a key to two parties that wish to
exchange data, without allowing others to see the key
Key Distribution

• For two parties A and B, there are the following


options:
• A key can be selected by A and physically delivered to B
1

• A third party can select the key and physically deliver it to A and
B
2
• If A and B have previously and recently used a key, one party
could transmit the new key to the other, using the old key to
3 encrypt the new key

• If A and B each have an encrypted connection to a third party C,


C could deliver a key on the encrypted links to A and B
4
Kerberos
• Key distribution and user authentication service
developed at MIT

• Provides a centralized authentication server whose


function is to authenticate users to servers and servers to
users

• Relies exclusively on symmetric encryption, making no


use of public-key encryption

Two versions are in use


• Version 4 implementations still exist, although this version is being
phased out
• Version 5 corrects some of the security deficiencies of version 4
and has been issued as a proposed Internet Standard (RFC 4120)
Kerberos version 4

• A basic third-party authentication scheme

• Authentication Server (AS)


• Users initially negotiate with AS to identify self
• AS provides a non-corruptible authentication credential
(ticket granting ticket TGT)

• Ticket Granting Server (TGS)


• Users subsequently request access to other services from
TGS on basis of users TGT

• Complex protocol using DES


Table 4.1
Summary of Kerberos Version 4 Message
Exchanges
Kerberos Realms
• Kerberos realm
A Kerberos environment consists of:
• A set of managed nodes that share
the same Kerberos database
• The Kerberos database resides on
the Kerberos master computer
system, which should be kept in a A Kerberos server
physically secure room
• A read-only copy of the Kerberos
database might also reside on other
Kerberos computer systems
A number of clients
• All changes to the database must be
made on the master computer
system
• Changing or accessing the contents A number of application
of a Kerberos database requires the servers
Kerberos master password
Key distribution using
asymmetric encryption
• One of the major roles of public-key encryption is to address the
problem of key distribution

• There are two distinct aspects to the use of public-key encryption in


this regard:
• The distribution of public keys
• The use of public-key encryption to distribute secret keys

• Public-key certificate
• Consists of a public key plus a user ID of the key owner, with the whole
block signed by a trusted third party
• Typically, the third party is a certificate authority (CA) that is trusted by
the user community, such as a government agency or a financial institution
• A user can present his or her public key to the authority in a secure
manner and obtain a certificate
• The user can then publish the certificate
• Anyone needing this user’s public key can obtain the certificate and verify
that it is valid by way of the attached trusted signature
X.509 Certificates
• ITU-T recommendation X.509 is part of the X.500 series of
recommendations that define a directory service

• Defines a framework for the provision of authentication services


by the X.500 directory to its users

• The directory may serve as a repository of public-key certificates

• Defines alternative authentication protocols based on the use of


public-key certificates
• Was initially issued in 1988
• Based on the use of public-key cryptography and digital signatures

• The standard does not dictate the use of a specific algorithm but
recommends RSA
Obtaining a user’s
certificate
• User certificates generated by a CA have the following
characteristics:
• Any user with access to the public key of the CA can
verify the user public key that was certified
• No party other than the certification authority can
modify the certificate without this being detected

• Because certificates are unforgeable, they can be placed


in a directory without the need for the directory to
make special efforts to protect them
Revocation of
certificates
• Each certificate includes a period of validity

• Typically a new certificate is issued just before the


expiration of the old one

• It may be desirable on occasion to revoke a certificate


before it expires for one of the following reasons:
• The user’s private key is assumed to be compromised
• The user is no longer certified by this CA; reasons for this
include subject’s name has changed, the certificate is
superseded, or the certificate was not issued in conformance
with the CA’s policies
• The CA’s certificate is assumed to be compromised
Identity Management
• A centralized, automated approach to provide enterprise wide access to
resources by employees and other authorized individuals
• Focus is defining an identity for each user (human or process), associating
attributes with the identity, and enforcing a means by which a user can verify
identity
• Central concept is the use of single sign-on (SSO) which enables a user to
access all network resources after a single authentication

• Principal elements of an identity management system:


• Authentication
• Authorization
• Accounting
• Provisioning
• Workflow automation
• Delegated administration
• Password synchronization
• Self-service password reset
• Federation
Summary
• Symmetric key distribution • X.509 certificates
using symmetric encryption • Certificates
• X.509 Version 3
• Kerberos
• Version 4 • Public-key infrastructure
• Version 5 • PKIX management
functions
• Key distribution using • PKIX management
asymmetric encryption protocols
• Public-key certificates
• Public-key distribution of • Federated identity
secret keys management
• Identity management
• Identity federation

You might also like