Lecture 14: 30th October 2019 Flashcards
Needham-Shroeder & Kerberos
What is key exchange?
Methods by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.
What is PKI?
PKI = Public Key Infrastructure = A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption to aid trusted communication by verifying the authenticity, integrity, and configuration of messages.
How does key exchange work?
Alice asks Cathy to talk to Bob and uses a nonce. Cathy replies with a packet for Bob introducing Alice to Bob. Cathy then passes messages with Alice contacting Bob and Bob replying with a nonce.
What is Needham-Schroeder?
A protocol that uses PKI to exchange cryptographic keys on an insecure network.
How does Needham-Schroeder key exchange work?
A wants to talk to B and C is a TTP (server).
- A ->C: A, B, NA; NA is a nonce, a number used once, e.g. clock time.
- C->A: {NA, B, KAB, {KAB, A}KBC }KAC; KAB = key for A to use with B, KAC = key for A to use with C, A = identity of A, B = identity of B
- A->B: {KAB, A}KBC: KBC is key for B to use with C, given by C
- B->A: {NB}KAB: challenge response - use a ley and expect a nonce back to verify you can exchange data
- A->B: {NB-1}KAB: respond to the above challenge; note -1 is just a known operation in the protocol. After B verifies the response, secure comms and trust has been established between A and B via the TTP C.
What is a network session?
A temporary series of interactions and information exchanges between two or more communicating devices, or between a computer and user, during a single connection.
What is a nonce?
“number only once”: random number used to identify a communications exchange and establish secure communications; ~ a session key
How and why are nonces used in Needham-Schroeder key exchange?
They are given by the opening host because they mitigate replay attacks in which people pretend to be a TTP.
What are the limitations of Needham-Schroeder key exchange?
Alice may stockpile keys for communication with various people. Cathy has no way to revoke those keys. If KAC is compromised, the attacker can obtain more keys or authority. Cathy must keep records of all keys issued.
Malicious attackers can be in the middle of the opening host and TTP, and then pose as the other host trying to be contacted. They return the response from the TTP as if the opening host was trying to contact them before or instead of the one to contact the other host they actually want to.
How can you authenticate users and control access in distributed systems?
With a user identity, user network address, or an access operation
What is a LSA?
LSA = Local Security Authority = A Microsoft Windows protected subsystem that is part of the Windows Client Authentication Architecture which authenticates users and creates logon session to the local computer.
Why are LSAs used over password prompts in modern systems?
They are more secure.
Why do modern protocols use asymetric encryption over Needham-Schroeder?
They are more secure. There are many issues: aliveness, freshness, replay, message integrity, hijacking (MITM), header and body encryption, cipher suites, strength, old standards.
What is Kerberos?
The distributed Access Control system which was the default option in Windows 2000.
What are the types of TTPs in Kerberos?
Kerberos has 2 types of TTP: authentication servers to which users log on and ticket granting servers that issues time-limited tickets for access to resources