Lecture 14: 30th October 2019 Flashcards

Needham-Shroeder & Kerberos

1
Q

What is key exchange?

A

Methods by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PKI?

A

PKI = Public Key Infrastructure = A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption to aid trusted communication by verifying the authenticity, integrity, and configuration of messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does key exchange work?

A

Alice asks Cathy to talk to Bob and uses a nonce. Cathy replies with a packet for Bob introducing Alice to Bob. Cathy then passes messages with Alice contacting Bob and Bob replying with a nonce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Needham-Schroeder?

A

A protocol that uses PKI to exchange cryptographic keys on an insecure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Needham-Schroeder key exchange work?

A

A wants to talk to B and C is a TTP (server).

  1. A ->C: A, B, NA; NA is a nonce, a number used once, e.g. clock time.
  2. C->A: {NA, B, KAB, {KAB, A}KBC }KAC; KAB = key for A to use with B, KAC = key for A to use with C, A = identity of A, B = identity of B
  3. A->B: {KAB, A}KBC: KBC is key for B to use with C, given by C
  4. B->A: {NB}KAB: challenge response - use a ley and expect a nonce back to verify you can exchange data
  5. A->B: {NB-1}KAB: respond to the above challenge; note -1 is just a known operation in the protocol. After B verifies the response, secure comms and trust has been established between A and B via the TTP C.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a network session?

A

A temporary series of interactions and information exchanges between two or more communicating devices, or between a computer and user, during a single connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a nonce?

A

“number only once”: random number used to identify a communications exchange and establish secure communications; ~ a session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How and why are nonces used in Needham-Schroeder key exchange?

A

They are given by the opening host because they mitigate replay attacks in which people pretend to be a TTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the limitations of Needham-Schroeder key exchange?

A

Alice may stockpile keys for communication with various people. Cathy has no way to revoke those keys. If KAC is compromised, the attacker can obtain more keys or authority. Cathy must keep records of all keys issued.

Malicious attackers can be in the middle of the opening host and TTP, and then pose as the other host trying to be contacted. They return the response from the TTP as if the opening host was trying to contact them before or instead of the one to contact the other host they actually want to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you authenticate users and control access in distributed systems?

A

With a user identity, user network address, or an access operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a LSA?

A

LSA = Local Security Authority = A Microsoft Windows protected subsystem that is part of the Windows Client Authentication Architecture which authenticates users and creates logon session to the local computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are LSAs used over password prompts in modern systems?

A

They are more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do modern protocols use asymetric encryption over Needham-Schroeder?

A

They are more secure. There are many issues: aliveness, freshness, replay, message integrity, hijacking (MITM), header and body encryption, cipher suites, strength, old standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Kerberos?

A

The distributed Access Control system which was the default option in Windows 2000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of TTPs in Kerberos?

A

Kerberos has 2 types of TTP: authentication servers to which users log on and ticket granting servers that issues time-limited tickets for access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ticket granting servers?

A

Specialised computers that issue time-restricted tokens granting users access to resources.

17
Q

What are some general issues with asymetric key cryptography?

A

There are many issues: aliveness, freshness, replay, message integrity, hijacking (MITM), header and body encryption, cipher suites, strength, standards.

18
Q

What are authentication servers?

A

A computer running applications which verify the identities of users before they are allowed to access resources in a session.

19
Q

How does ticket granting work in Kerberos?

A

The protocol for ticket granting is a variant of Needham-Schroeder:

Alice logs onto server Sam using a password and requests resource B:

  1. A ->S: A, B

The client software in her PC fetches a ticket encrypted under her password and which contains the key KAS. For access to resource B, the ticket KAB with timestamp TS and lifetime L is given.

  1. S->A: {TS, L, KAB, B, {TS, L, KAB, A}KBS }KAS

Alice gets a copy of the ticket to read encrypted under KAS. She verifies the ticket by sending the timestamp TA to B which confirms its liveness by sending back the timestamp incremented by 1.

  1. A->B: {TS, L, KAB , A}KBS , {A, TA}KAB
  2. B->A: {TA + 1}KAB
20
Q

Why were nonces replaced with timestamps in Needham-Schroeder?

A

The random nonce of the Needham-Shroeder are replaced by timestamps to ensure freshness and aliveness.

21
Q

What are some problems with timestamps and time synchronisation that may explain why they weren’t included in Needham-Schroeder?

A

time zones giving different timestamps, timeouts, clock mismatches, and clocks changing every time

22
Q

What is DSSA?

A

DSSA = Distributed System Security Architecture = a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. The architecture covers user and system authentication, mandatory and discretionary security, secure initialization and loading, and delegation in a general-purpose computing environment of heterogeneous systems where there are no central authorities, no global trust, and no central controls.

23
Q

What is DSSA/SPX?

A

DSSA/SPX is the authentication protocol of DSSA.

24
Q

What is DASS?

A

DASS = Distributed Authentication Security Service = the name DSSA/SPX was adopted under.

25
Q

What is GSS-API?

A

An application programming interface for programs to access security services. For a distributed system the service layer is the most appropriate location for security enforcement.

26
Q

What is CORBA?

A

CORBA = Common Object Request Broker Architecture = a standard defined by the Object Management Group designed to facilitate the communication of heterogeneous systems.

27
Q

What is ORB?

A

ORB = Object Request Broker = a middleware which allows program calls to be made from one computer to another via a computer network, providing location transparency through remote procedure calls. It handles interactions between users and objects, and objects themselves. The ORB library contains object services such as naming, concurrency, querying, trading etc.

28
Q

What is RADIUS protocol?

A

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. It carries information related to authentication, authorization, and configuration between a Network Access Server that desires to authenticate its links and a shared Authentication Server.

29
Q

What are some issues with complex exchange mechanisms?

A

issues with key handling; freshness; CA vulnerabilities; etc.

30
Q

What is a CDC?

A

CDC = Certificate Distribution Centre = The CDC is a certificate granting server within DSSA/SPX. Certificates are tickets signed by CA which contains the public key of the party being certified. Since the CDC is merely distributing previously signed certificates, it is not necessary for it to be trusted.

31
Q

What is a TTP?

A

A trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party. It establishes trust between them and this allows them to begin secure communications.