Preview

Public Key Cryptography Case Study

Good Essays
Open Document
Open Document
971 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Cryptography Case Study
The study of Public-Key Cryptography Enabled Kerberos Authentication by Sufyan and Mayada (2011) attempt to extend the Kerberos authentication protocol standard to support public key cryptography. This is to eliminate some of the limitations in the standard Kerberos protocol which uses symmetric key cryptography. There are 3 extensions to add support of public-key cryptography at different stages of the Kerberos framework, which are PKINIT, PKCROSS and PKTAPP. Public-Key Cryptography for Initial Authentication in Kerberos (PKINIT) enables the use of public-key cryptography for an initial authentication between the authenticated client and its local KDC (Key Distribution Center). The purpose of PKINIT is to secure the transmission of ticket …show more content…
Mutual authentication between local KDC and remote KDC involves the PKCROSS ticket. If combined with PKINIT, the operation would continue from the part where the client receives the session key and TGT for TGS. The client will request for a cross-realm TGT from the local TGS by sending the local TGS its TGT, authenticator for the client and also the ID of the remote TGS. After verifying the authenticity of the request by comparing the information of the decrypted authenticator and TGT, the TGS will proceed to request for the cross-realm TGT and also the session key for communication between the client and the remote TGS. These operations are similar to PKINIT with the local TGS acting as the client. Upon receiving the cross-realm TGT and session key, local TGS will encrypt these two information using the session key for communication between local TGS and the client before sending it to the client. The rest of the operation is similar to the traditional …show more content…
PKTAPP enable the authentication exchange to be directly performed between the client and the application server (APPSERV) instead of relying on trusted intermediary. The client started by requesting a certificate from the application server. Upon verification, the client will request for a service ticket to the application server by sending its signature, session key and also the certificate that are encrypted using the application server public key. After that, the server returns the service ticket together with a new session key for the ticket that is encrypted using the client-generated session key. After that, the ticket can be used to request for specific service from the application server using the traditional Kerberos

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    Advanced Encryption Standard support for the Kerberos protocol – logins are a lot more secure.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Pyle, N. (2009, September 01). Designing and implementing a pki: Part i design and planning. Retrieved from…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    34. Kerberos is an example of a single sign-on system providing enterprises with scalability and flexibility.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is a structure that provides all the necessary components to enable different users and entities to communicate in a secure and a predictable manner.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    PKI Paper

    • 801 Words
    • 3 Pages

    In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested…

    • 801 Words
    • 3 Pages
    Good Essays