Unit 3
User Authentication Protocols
User Authentication Protocols
- Remote User Authentication Principles
- Remote User Authentication Using Symmetric Encryption
- Kerberos
- Remote User Authentication Using Asymmetric Encryption
- Federated Identity Management
Unit 3 - Key Points
Mutual authentication protocols enable communicating parties to satisfy themselves mutually about each other’s identity and to exchange session keys.
Kerberos is an authentication service designed for use in a distributed environment.
Kerberos provides a trusted third-party authentication service that enables clients and servers to establish authenticated communication.
Identity management is a centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals.
Identity federation is, in essence, an extension of identity management to multiple security domains.
3.1 Remote User Authentication Principles
- Mutual Authentication
- One-Way Authentication
3.1.1 Mutual Authenentication
Such protocols enable communicating parties to satisfy themselves mutually about each other’s identity and to exchange session keys.
2 Steps of User Authenentication
- Identification Step
- Verification Step
[fit]Four general means of authenticating a user’s identity
- Something the individual knows
- Password || PINS - Something the individual possesses
- TOKENs - Something the individual is
- Static biometrics - fingerprint || retina || face - Something the individual does
-
Dynamic biometrics - Voice Pattern Handwriting characteristics
#[fit] Challenges in Mutual Authentication
- Confidentiality
- Masquerade
- Compromization of Session Keys
- Prior existence of secret or public keys
- Timeliness
- Replays
4 Types of Replay Attacks
- Simple Replay
- Repetion that can be logged
- Repetition that cannot be detected
- Backward replay without modification
Mitigating Replay Attacks
- Sequence Numbers
- Timestamps
- Challenge / Response
3.1.2 One-Way Authenentication
3.2 Remote User Authentication Using Symmetric Encryption
- Mutual Authentication
- One-Way Authentication
3.2.1 Mutual Authentication
- [NEED78]
- [DENN81, DENN82]
- [KEHN92]
[NEED78]
[DENN81, DENN82]
[KEHN92]
3.2.2 One-Way Authentication
#3.3 Kerberos
Versions
Kerberos v4
Kerberos v5
Kerberos V4
Step by step
Shortcomings of Kerberos V4
- Environment Shortcomings
- Technical Deficiencies
Environment Shortcomings
- Encryption system dependence
- Internet protocol dependence
- Message Byte Ordering
- Ticket Lifetime
- Authentication Forwarding
- Inter-Realm Authentication
Encryption system dependence
- DES Dependency of v4
Internet protocol dependence
-IP Protocol Addresses only
Message Byte Ordering
- Did not follow convention of byte ordering/ was ambigious
- ASN.1 - Abstract Syntax Notation One
- BER - Basic Encoding Rules
Ticket Lifetime
- 8 bit life time
- Unit of 5 mins
- total (2^8)*5 = 1280 mins ~= 21 hours
- Explicit start and end time in v5
Authentication Forwarding
- No forwarding of credentials
- Example - Printing a File on a network
Inter-Realm Authentication
- Lack of interoperability
- N Realms = (N^2) Kerberos-to-kerberos relationships
Technical Deficiencies
- Double Encryption
- PCBC Encryption
- Session Key
- Password Attacks
Double Encryption
- Redundant Double encryption
- Removed in v5
PCBC Encryption mode in DES
- Propagating Cipher Block Chaining
- Non-standard
Session Key
- Possible threat of replay attack
- Use of sub-session key between client and server
Password Attacks
- Vulnerable to password attack
- Bruteforce or dictionary attacks
Kerberos V5
https://goo.gl/v7HTXh
Remote User Authentication Using Asymmetric Encryption
- Mutual Authentication
- One-Way Authentication
Asymmetric
Symmetric [KEHN92]
Federated Identity Management
- Identity Management
- Identity Federation
Federated identity management is a relatively new concept dealing with the use of a common identity management scheme across multiple enterprises and numerous applications and supporting many thousands, even millions, of users.
Identity Management
Identity management is a centralized, automated approach to provide enterprisewide access to resources by employees and other authorized individuals.
Principal Elements of Identity Management System
- Authentication
- Authorization
- Accounting
- Provisioning
- Workflow Automation
- Delegated Administration
- Password Synchronization
- Self-service Password Reset
- Federation
Identity Federation
Identity federation is, in essence, an extension of identity management to multiple security domains. Such domains include autonomous internal business units, external business partners, and other third-party applications and services.
The goal is to provide the sharing of digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.