Click here to start
Table of contents
An Introduction to Kerberos
What this talk is about
What this talk is not about
What is Kerberos?
Kerberos: etymology
PowerPoint Presentation
Fluffy, the 3 headed dog, from “Harry Potter and the Sorcerers Stone”
Some Kerberos benefits
So, what is Authentication?
Password based Authentication
Cryptographic Authentication
Encryption and Decryption
Symmetric Key Cryptography
Asymmetric Key Cryptography
Communicating Parties
Simple shared-secret based cryptographic authentication
Add mutual authentication
Problems with this scheme
Mediated Authentication
Slide 20
Slide 21
Slide 22
Slide 23
Kerberos uses timestamps
Kerberos (almost)
Kerberos (roughly)
Needham-Schroeder Protocol
Kerberos (detailed)
Kerberos “principal”
Kerberos without TGS
Slide 31
Slide 32
Slide 33
Combining 2 previous diags
Slide 35
Review: Kerberos Credentials
Ticket Granting Service (TGS)
Slide 38
Slide 39
Kerberos with TGS
TGS Benefits
Slide 42
Slide 43
Slide 44
Slide 45
Levels of Session Protection
Pre-authentication
Slide 48
Kerberos & Two-factor auth
Cross Realm Authentication
Hierarchy/Chain of Realms
Kerberos and PubKey Crypto
Kerberos: summary
Advantages of Kerberos (1)
Advantages of Kerberos (2)
Kerberos caveats
Kerberos caveats (2)
References
References (cont)
Questions or comments?
Author:
Shumon Huque