Click here to start

Table of contents

Author: Shumon Huque

An Introduction to Kerberos What this talk is about What this talk is not about What is Kerberos? Kerberos: etymology PowerPoint Presentation Fluffy, the 3 headed dog, from “Harry Potter and the Sorcerers Stone” Some Kerberos benefits So, what is Authentication? Password based Authentication Cryptographic Authentication Encryption and Decryption Symmetric Key Cryptography Asymmetric Key Cryptography Communicating Parties Simple shared-secret based cryptographic authentication Add mutual authentication Problems with this scheme Mediated Authentication Slide 20 Slide 21 Slide 22 Slide 23 Kerberos uses timestamps Kerberos (almost) Kerberos (roughly) Needham-Schroeder Protocol Kerberos (detailed) Kerberos “principal” Kerberos without TGS Slide 31 Slide 32 Slide 33 Combining 2 previous diags Slide 35 Review: Kerberos Credentials Ticket Granting Service (TGS) Slide 38 Slide 39 Kerberos with TGS TGS Benefits Slide 42 Slide 43 Slide 44 Slide 45 Levels of Session Protection Pre-authentication Slide 48 Kerberos & Two-factor auth Cross Realm Authentication Hierarchy/Chain of Realms Kerberos and PubKey Crypto Kerberos: summary Advantages of Kerberos (1) Advantages of Kerberos (2) Kerberos caveats Kerberos caveats (2) References References (cont) Questions or comments?