Prof. Rupesh G. Vaishnav
rupesh.vaishnav@darshan.ac.in
94280-37452
Information & Network Security (2170709) Darshan Institute of Engineering & Technology
UNIT-9
Remote user
authentication
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 2
INS is very Interesting Subject
Outline
 Remote user authentication with symmetric encryption
 Remote user authentication with asymmetric encryption
 Kerberos
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 3
INS is very Interesting Subject
Remote user authentication with symmetric encryption
Mutual Authentication
1. A ---> KDC
IDa || IDb || N1
2. KDC ---> A
E(Ka, [Ks || IDb || N1 || E(Kb,[Ks || IDa)])
3. A ---> B
E(Kb, [Ks || IDa])
4. B ---> A
E(Ks, N2)
5. A ---> B
E(Ks, f(N2))
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 4
INS is very Interesting Subject
Remote user authentication with symmetric encryption
One-way Authentication
1. A ---> KDC
IDa || IDb || N1
2. KDC ---> A
E(Ka, [Ks || IDb || N1 || E(Kb, [Ks ||
IDa])])
3. A ---> B
E(Kb, [Ks || IDa]) || E(Ks, M)
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 5
INS is very Interesting Subject
Kerberos
 Kerberos provides a trusted third-party authentication service
that enables clients and servers to establish authenticated
communication.
 Kerberos is an authentication service designed for use in a
distributed environment.
 Version 4 of Kerberos makes use of DES, to provide the
authentication service.
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 6
INS is very Interesting Subject
Kerberos – Simple Dialogue
1. C ---> AS: IDc || Pc || IDv
2. AS ---> C: Ticket
3. C ---> V: IDc || Ticket
Ticket = E(Kv, [IDc, ADc, IDv])
Authentication
Server-AS
Application
Server - V
User - C
(1)
(2)
(3)
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 7
INS is very Interesting Subject
Kerberos – Simple Dialogue
1. C ---> AS: IDc || Pc || IDv
2. AS ---> C: Ticket
3. C ---> V: IDc || Ticket
Ticket = E(Kv, [IDc, ADc, IDv])
 Where,
• C = Client
• AS = Authentication Server
• V = Server
• IDc = Identification of user C
• Idv = Identification of V
• Pc = Password on User C
• Adc = Network Address of C
• Kv = Secret key shared by AS and V
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 8
INS is very Interesting Subject
Kerberos – More Secure Dialogue
Client-C
Ticket Granting
Server-TGS
Authentication
Server-AS
TicketTGS to access
TGS
Request for
TicketTGS
Request
for TicketV
Request for
TicketV
Request for
Service
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 9
INS is very Interesting Subject
Kerberos – More Secure Dialogue
 Once per user logon session
1. C ---> AS: IDc || IDTGS
2. AS ---> C: E(Kc, TicketTGS)
 Once per type of service
1. C ---> TGS: IDc || IDv || TicketTGS
2. TGS ---> C: TicketV
 Once per service session
1. C ---> V: IDc || TicketV
TicketTGS = E(KTGS, [IDc, ADc, IdTGS, TS1,
Lifetime1])
TicketV = E(KV, [IDc, ADc, IdV, TS2, Lifetime2])
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 11
INS is very Interesting Subject
Kerberos Version 4 – Step-1
 The client sends a plaintext request to the AS asking for a ticket it
can use to talk to the TGS.
 Request:
• Login name
• TGS name
 Since this request contains only well-known names, it does not
need to be sealed.
C--->AS : IDc||IDtgs||TS1
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 13
INS is very Interesting Subject
Kerberos Version 4 – Step-2
 The AS finds the keys corresponding to the login name and the
TGS name.
 The AS creates a ticket:
• Login name
• TGS name
• Client network address
• TGS session key
 The AS seals the ticket with the TGS secret key.
AS--->C: E(Kc, [Kc,tgs||IDtgs||TS2||Lifetime2||
Tickettgs])
Tickettgs=E(Ktgs, [Kc,tgs||IDc||ADc||IDtgs||TS2||
Lifetime2])
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 15
INS is very Interesting Subject
Kerberos Version 4 – Step-3
 The client decrypts the message using the user’s password as the
secret key.
 The client now has a session key and ticket that can be used to
contact the TGS.
 The client cannot see inside the ticket, since the client does not
know the TGS secret key.
 When a client wants to start using a server (service), the client
must first obtain a ticket.
 The client composes a request to send to the TGS
C--->TGS: Idv||Tickettgs||Authenticatorc
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 17
INS is very Interesting Subject
Kerberos Version 4 – Step-4
 The TGS decrypts the ticket using it’s secret key. Inside is the TGS
session key.
 The TGS decrypts the authenticator using the session key.
 The TGS check to make sure login names, client addresses and TGS
server name are all ok.
 TGS makes sure the authenticator is recent.
 Builds a ticket for the client and requested server. The ticket is
sealed with the server key.
 Creates a session key
 Seals the entire message with the tgs session key and sends it to
the client.
TGS--->C: E(Kc,tgs, [Kc,v||IDv||TS4||Ticketv])
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 19
INS is very Interesting Subject
Kerberos Version 4 – Step-4
Tickettgs=E(Ktgs, [Kc,tgs||IDc||ADc||IDtgs||TS2||
Lifetime2])
TicketV=E(KV, [Kc,V||IDc||ADc||IDV||TS4||
Lifetime4])
AuthenticatorC=E(Kc,tgs, [IDc||ADc||TS3])
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 21
INS is very Interesting Subject
Kerberos Version 4 – Step-5, 6
 The client now decrypts the TGS response using the TGS session
key.
 The client now has a session key for use with the new server, and
a ticket to use with that server.
 The client can contact the new server using the same format used
to access the TGS.
TicketV=E(KV, [Kc,V||IDc||ADc||IDV||TS4||
Lifetime4])
AuthenticatorC=E(Kc,v, [IDc||ADc||TS5])
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 22
INS is very Interesting Subject
Ticket
 Each request for a service requires a ticket.
 A ticket provides a single client with access to a single server.
 Tickets are dispensed by the “ticket granting server” (TGS), which
has knowledge of all the encryption keys.
 Tickets are meaningless to clients, they simply use them to gain
access to servers.
 The TGS seals (encrypts) each ticket with the secret encryption key
of the server.
 Sealed tickets can be sent safely over a network - only the server
can make sense out of it.
 Each ticket has a limited lifetime (a few hours).
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 23
INS is very Interesting Subject
Ticket Contents
 Client name (user login name)
 Server name
 Client host network address
 Session key for client/server
 Ticket lifetime
 Creation timestamp
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt
Kerberos
Realm
Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 26
INS is very Interesting Subject
Remote user authentication with Asymmetric encryption
Mutual Authentication
Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt

More Related Content

PDF
Presentation of Kerberos as per ECE scheme
PDF
module1 network security.pdf
PPT
Kerberos
PDF
IRJET- Secure Kerberos System in Distributed Environment
PPTX
Kerberos Survival Guide SPS Chicago
PPTX
Kerberos survival guide SPS Kansas City
PPTX
Kerberos : An Authentication Application
PDF
IS Unit 7_Network Security
Presentation of Kerberos as per ECE scheme
module1 network security.pdf
Kerberos
IRJET- Secure Kerberos System in Distributed Environment
Kerberos Survival Guide SPS Chicago
Kerberos survival guide SPS Kansas City
Kerberos : An Authentication Application
IS Unit 7_Network Security

Similar to Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt (20)

PPT
Authentication Application in Network Security NS4
PPTX
Kerberos survival guide - SPS Ozarks 2010
PDF
IRJET- Internal Security in Metropolitan Area Network using Kerberos
PPT
1699250.ppt
PPTX
SharePoint Saturday Kansas City - Kerberos Survival Guide
PPTX
SPS Ozarks 2012: Kerberos Survival Guide
PPTX
Kerberos
PDF
Module 4 network and computer security
PDF
Blockchain Based Electronic Ballot System
PPTX
Kerberos survival guide-STL 2015
PPTX
Kerberos Survival Guide: SharePointalooza
PPTX
Kerberos Survival Guide: Columbus 2015
PDF
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
PPTX
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
PDF
Deep Dive In To Kerberos
PPTX
1165839977.pptx
PPT
Kerberos Presentation: Provides a centralized authentication server to authen...
PPTX
Kerberos Authentication and SSO (Single Sign On) mechanism by Siavash Golchoo...
DOCX
Ravikanth Resume
PDF
Kerberos Survival Guide - St. Louis Day of .Net
Authentication Application in Network Security NS4
Kerberos survival guide - SPS Ozarks 2010
IRJET- Internal Security in Metropolitan Area Network using Kerberos
1699250.ppt
SharePoint Saturday Kansas City - Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival Guide
Kerberos
Module 4 network and computer security
Blockchain Based Electronic Ballot System
Kerberos survival guide-STL 2015
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: Columbus 2015
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Deep Dive In To Kerberos
1165839977.pptx
Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos Authentication and SSO (Single Sign On) mechanism by Siavash Golchoo...
Ravikanth Resume
Kerberos Survival Guide - St. Louis Day of .Net
Ad

More from VivekanandaGN1 (20)

PPTX
Study_Material_Presentations_Unit-2.pptx
PPT
Classical-Problem-of-Synchronization in OS
PPTX
Web Security and its Importance in the Present era
PPT
Cost, Price, and Price for Performance.ppt
PPT
Computer performance and cost analysis in systems
PPT
Technology trends-Computer food chain technologies
PPT
Fundamentals of Computer Architecture lecture notes
PPT
Digital computer architecture issues in IO
PPT
Storage devices metrics productivity- IO Introduction
PPTX
Web security Threats and approaches in Security.pptx
PPTX
Key management and Distribution in Network security.ppt
PPTX
Message Authentication Codes in Security.pptx
PPTX
Cryptographic Hash Functions in Security.pptx
PPTX
Asymmetric Ciphers in Networks and Security.pptx
PPTX
IdentityTheft by federal trade comission
PPTX
Cybercrime Mobile and Wireless Devices.pptx
PPTX
Cyber Secuirty Fully explained Lecture Notes
PPT
CYBER-CRIME PRESENTATION with real-time examples
PDF
GANS Project for Image idetification.pdf
PDF
Cheat sheet SQL commands with examples and easy understanding
Study_Material_Presentations_Unit-2.pptx
Classical-Problem-of-Synchronization in OS
Web Security and its Importance in the Present era
Cost, Price, and Price for Performance.ppt
Computer performance and cost analysis in systems
Technology trends-Computer food chain technologies
Fundamentals of Computer Architecture lecture notes
Digital computer architecture issues in IO
Storage devices metrics productivity- IO Introduction
Web security Threats and approaches in Security.pptx
Key management and Distribution in Network security.ppt
Message Authentication Codes in Security.pptx
Cryptographic Hash Functions in Security.pptx
Asymmetric Ciphers in Networks and Security.pptx
IdentityTheft by federal trade comission
Cybercrime Mobile and Wireless Devices.pptx
Cyber Secuirty Fully explained Lecture Notes
CYBER-CRIME PRESENTATION with real-time examples
GANS Project for Image idetification.pdf
Cheat sheet SQL commands with examples and easy understanding
Ad

Recently uploaded (20)

PPTX
highway-150803160405-lva1-app6891 (1).pptx
PPT
Basics Of Pump types, Details, and working principles.
PDF
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
PPTX
IOP Unit 1.pptx for btech 1st year students
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
25AF1191PC303 MODULE-1 CHAIN SURVEYING SEMESTER III SURVEYING
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
SURVEYING BRIDGING DBATU LONERE 2025 SYLLABUS
PDF
Performance, energy consumption and costs: a comparative analysis of automati...
PDF
ITEC 1010 - Networks and Cloud Computing
PDF
PhD defense presentation in field of Computer Science
PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PDF
Software defined netwoks is useful to learn NFV and virtual Lans
PPTX
Unit I - Mechatronics.pptx presentation
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
Module 1 part 1.pdf engineering notes s7
highway-150803160405-lva1-app6891 (1).pptx
Basics Of Pump types, Details, and working principles.
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
IOP Unit 1.pptx for btech 1st year students
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
25AF1191PC303 MODULE-1 CHAIN SURVEYING SEMESTER III SURVEYING
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
SURVEYING BRIDGING DBATU LONERE 2025 SYLLABUS
Performance, energy consumption and costs: a comparative analysis of automati...
ITEC 1010 - Networks and Cloud Computing
PhD defense presentation in field of Computer Science
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
Software defined netwoks is useful to learn NFV and virtual Lans
Unit I - Mechatronics.pptx presentation
UNIT-I Machine Learning Essentials for 2nd years
Module 1 part 1.pdf engineering notes s7

Remote User Authentication ,Symmetric, Asymmetric and Kerberos.ppt

  • 1. Prof. Rupesh G. Vaishnav [email protected] 94280-37452 Information & Network Security (2170709) Darshan Institute of Engineering & Technology UNIT-9 Remote user authentication
  • 2. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 2 INS is very Interesting Subject Outline  Remote user authentication with symmetric encryption  Remote user authentication with asymmetric encryption  Kerberos
  • 3. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 3 INS is very Interesting Subject Remote user authentication with symmetric encryption Mutual Authentication 1. A ---> KDC IDa || IDb || N1 2. KDC ---> A E(Ka, [Ks || IDb || N1 || E(Kb,[Ks || IDa)]) 3. A ---> B E(Kb, [Ks || IDa]) 4. B ---> A E(Ks, N2) 5. A ---> B E(Ks, f(N2))
  • 4. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 4 INS is very Interesting Subject Remote user authentication with symmetric encryption One-way Authentication 1. A ---> KDC IDa || IDb || N1 2. KDC ---> A E(Ka, [Ks || IDb || N1 || E(Kb, [Ks || IDa])]) 3. A ---> B E(Kb, [Ks || IDa]) || E(Ks, M)
  • 5. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 5 INS is very Interesting Subject Kerberos  Kerberos provides a trusted third-party authentication service that enables clients and servers to establish authenticated communication.  Kerberos is an authentication service designed for use in a distributed environment.  Version 4 of Kerberos makes use of DES, to provide the authentication service.
  • 6. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 6 INS is very Interesting Subject Kerberos – Simple Dialogue 1. C ---> AS: IDc || Pc || IDv 2. AS ---> C: Ticket 3. C ---> V: IDc || Ticket Ticket = E(Kv, [IDc, ADc, IDv]) Authentication Server-AS Application Server - V User - C (1) (2) (3)
  • 7. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 7 INS is very Interesting Subject Kerberos – Simple Dialogue 1. C ---> AS: IDc || Pc || IDv 2. AS ---> C: Ticket 3. C ---> V: IDc || Ticket Ticket = E(Kv, [IDc, ADc, IDv])  Where, • C = Client • AS = Authentication Server • V = Server • IDc = Identification of user C • Idv = Identification of V • Pc = Password on User C • Adc = Network Address of C • Kv = Secret key shared by AS and V
  • 8. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 8 INS is very Interesting Subject Kerberos – More Secure Dialogue Client-C Ticket Granting Server-TGS Authentication Server-AS TicketTGS to access TGS Request for TicketTGS Request for TicketV Request for TicketV Request for Service
  • 9. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 9 INS is very Interesting Subject Kerberos – More Secure Dialogue  Once per user logon session 1. C ---> AS: IDc || IDTGS 2. AS ---> C: E(Kc, TicketTGS)  Once per type of service 1. C ---> TGS: IDc || IDv || TicketTGS 2. TGS ---> C: TicketV  Once per service session 1. C ---> V: IDc || TicketV TicketTGS = E(KTGS, [IDc, ADc, IdTGS, TS1, Lifetime1]) TicketV = E(KV, [IDc, ADc, IdV, TS2, Lifetime2])
  • 11. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 11 INS is very Interesting Subject Kerberos Version 4 – Step-1  The client sends a plaintext request to the AS asking for a ticket it can use to talk to the TGS.  Request: • Login name • TGS name  Since this request contains only well-known names, it does not need to be sealed. C--->AS : IDc||IDtgs||TS1
  • 13. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 13 INS is very Interesting Subject Kerberos Version 4 – Step-2  The AS finds the keys corresponding to the login name and the TGS name.  The AS creates a ticket: • Login name • TGS name • Client network address • TGS session key  The AS seals the ticket with the TGS secret key. AS--->C: E(Kc, [Kc,tgs||IDtgs||TS2||Lifetime2|| Tickettgs]) Tickettgs=E(Ktgs, [Kc,tgs||IDc||ADc||IDtgs||TS2|| Lifetime2])
  • 15. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 15 INS is very Interesting Subject Kerberos Version 4 – Step-3  The client decrypts the message using the user’s password as the secret key.  The client now has a session key and ticket that can be used to contact the TGS.  The client cannot see inside the ticket, since the client does not know the TGS secret key.  When a client wants to start using a server (service), the client must first obtain a ticket.  The client composes a request to send to the TGS C--->TGS: Idv||Tickettgs||Authenticatorc
  • 17. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 17 INS is very Interesting Subject Kerberos Version 4 – Step-4  The TGS decrypts the ticket using it’s secret key. Inside is the TGS session key.  The TGS decrypts the authenticator using the session key.  The TGS check to make sure login names, client addresses and TGS server name are all ok.  TGS makes sure the authenticator is recent.  Builds a ticket for the client and requested server. The ticket is sealed with the server key.  Creates a session key  Seals the entire message with the tgs session key and sends it to the client. TGS--->C: E(Kc,tgs, [Kc,v||IDv||TS4||Ticketv])
  • 19. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 19 INS is very Interesting Subject Kerberos Version 4 – Step-4 Tickettgs=E(Ktgs, [Kc,tgs||IDc||ADc||IDtgs||TS2|| Lifetime2]) TicketV=E(KV, [Kc,V||IDc||ADc||IDV||TS4|| Lifetime4]) AuthenticatorC=E(Kc,tgs, [IDc||ADc||TS3])
  • 21. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 21 INS is very Interesting Subject Kerberos Version 4 – Step-5, 6  The client now decrypts the TGS response using the TGS session key.  The client now has a session key for use with the new server, and a ticket to use with that server.  The client can contact the new server using the same format used to access the TGS. TicketV=E(KV, [Kc,V||IDc||ADc||IDV||TS4|| Lifetime4]) AuthenticatorC=E(Kc,v, [IDc||ADc||TS5])
  • 22. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 22 INS is very Interesting Subject Ticket  Each request for a service requires a ticket.  A ticket provides a single client with access to a single server.  Tickets are dispensed by the “ticket granting server” (TGS), which has knowledge of all the encryption keys.  Tickets are meaningless to clients, they simply use them to gain access to servers.  The TGS seals (encrypts) each ticket with the secret encryption key of the server.  Sealed tickets can be sent safely over a network - only the server can make sense out of it.  Each ticket has a limited lifetime (a few hours).
  • 23. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 23 INS is very Interesting Subject Ticket Contents  Client name (user login name)  Server name  Client host network address  Session key for client/server  Ticket lifetime  Creation timestamp
  • 26. Unit-9 Remote user authentication Darshan Institute of Engineering & Technology 26 INS is very Interesting Subject Remote user authentication with Asymmetric encryption Mutual Authentication

Editor's Notes

  • #2: X.800 and RFC 2828 International Telecommunication Union (ITU)