Chapter 4. Authentication Applications. Henric Johnson Blekinge Institute of Technology,Sweden http://www.its.bth.se/staff/hjo/ email@example.com Revised by Andrew Yang. Outline. Security Concerns Kerberos X.509 Authentication Service Recommended reading and Web Sites.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Blekinge Institute of Technology,Sweden
Revised by Andrew Yang
In Greek mythology, a many headed dog, the guardian of the entrance of Hades
Ticket = EKv[IDc ||Pc || IDv]
a. Frequently transmitted
b. As plaintext
Authentication Service Exhange: To obtain Ticket-Granting Ticket
Ticket-Granting Service Echange: To obtain Service-Granting Ticket
(3) C TGS: IDv ||Tickettgs ||Authenticatorc
(4) TGS C: EKc,tgs [Kc,¨v|| IDv || TS4 || Ticketv]
Client/Server Authentication Exhange: To Obtain Service
(5) C V: Ticketv || Authenticatorc
(6) V C: EKc,v [TS5 +1] (optional: for mutual authentication)
Typical Digital Signature Approach