Security Protocols Flashcards
It is a good idea to use sequentially increasing numbers as challenges in security protocols.(T/F)
False
In security protocol, an obvious security risk is that of impersonation.(T/F)
True
In Kerberos, the authentication server shares a unique secret key with each authorized computer on the network.(T/F)
True
In Kerberos, each human user has a master key shared with the authentication server, and the key is usually derived from the user’s password.(T/F)
True
In Kerberos, the purpose of using ticket-granting-ticket (TGT) is to minimize the exposure of a user?s master key.(T/F)
True
The ticket-granting ticket is never expired.(T/F)
False
Kerberos does not support inter-realm authentication. (T/F)
False
The purposes of a security protocol include:
A. Authentication
B. Key-exchange
C. Negotiate crypto algorithms and parameters
Example scenarios requiring a security protocol:
log in to mail.google.com
connecting to work from home using a VPN
network protocol defined
A network protocol defines the rules and conventions for communications between two entities.
security protocol defined
A security protocol defines the rules and conventions for SECURE communications.
Kerberos Protocol
Authentication and access control in a network environment
Every principal has a master (secret) key
- -Human user’s master key is derived from password
- -Other resources must have their keys configured in
All principals’ master keys are stored in the KDC database, protected/encrypted
Kerberos Benefits
Localhost does not need to store passwords
The master key that the user shares with the KDC is only used once every day
–This limits exposure of the master key
Ticket granting ticket
AS responds with TGT and session key, both encrypted with one time encryption key (DES)
TGT is a set of credentials used by client to apply for service
- -not just a specific application service
- -it’s for a ticket granting server that can be used to get more tickets
Indicates the AS has accepted the client and its user
Contains:
- user’s ID
- -server’s ID
- -timestamp
- lifetime after which ticket is invalid
- -copy of session key
Kerberos environment requirements
Kerberos server must have user ID and password of all participating users in its database.
Kerberos server must share a secret key with each server.