Key Distribution and User Authentication Flashcards

1
Q

What is a KDC?

A

A Key Distribution Centre is a trusted third party who will help us to distribute symmetric keys. There will usually be a permanent key between the KDC and individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is key distribution necessary?

A

We need to be able to make sure that both participants are using the same symmetric key, but also ensure that nobody else knows this key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is authentication by nonce?

A

This is used to prevent replay attacks. Essentially, when Alice introduces herself to Bob, he sends back a challenge nonce. Alice will encrypt this nonce with the shared secret key and send it back. Bob can then decrypt this and prove that Alice knows the secret key.
Note that a current timestamp could be used instead of a nonce, meaning only Alice would need to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reflection attack?

A

The attacker sends a nonce RA, and gets a reply back with RB, K(RA). The attacker then pretends to be Alice, and sends RB to Bob. Bob will reply with RC,K(RB). Then, the attacker can resume the initial handshake, by sending K(RB) back to Bob.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is mutual authentication via nonce?

A

Alice sends RA, Bob replies with RB, K(RA), Alice replies with K(RB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false, Alice has a shared secret key with her KDC, and so does Bob?

A

True, if they both use the same KDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a KDC request work?

A

Alice to KDC: Ka-k(A, B)
KDC generates ticket: Kb-k(A, Ka-b)
KDC to Alice: Ka-k(Ka-b, ticket)
Alice to Bob: ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Needham-Schroeder protect against replay attacks?

A

It uses nonces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What problem does Kerberos address?

A

How do we restrict access to servers on a distributed system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false, Kerberos uses symmetric encryption for bulk data transfer, and asymmetric encryption for the exchange of keys?

A

False, it only uses symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different servers involved in Kerberos?

A

Authentication Server, Ticket Granting Server, Server which we are trying to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many times do you need to log in with Kerberos?

A

Only once. The Ticket Granting Ticket provided by the authentication server will last a day usually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the Authentication Server in Kerberos send the user’s password?

A

It does not. The authentication server will use the user’s password to encrypt a session key for the TGS, the ID of the TGS, the TGS ticket itself, and a few other bits of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Kerberos, what is an authenticator?

A

An authenticator contains the ID of the user, their address, and a timestamp, encrypted with the session key given by the Authentication server or TGS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the authentication server?

A

To provide users with Ticket Granting Tickets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the ticket granting server?

A

To grant tickets.

17
Q

Describe roughly, what happens in a Kerberos exchange.

A

User requests a ticket granting ticket from authentication server. Authentication server gives them one (as well as a session key for TGS) encrypted with their password. The user then establishes a connection with the TGS using their session key, and requests a ticket, while also providing an authenticator. The TGS will respond with a new session key, encrypted with the old session key. Using the new session key, the user can then communicate with the intended server.