Review by Kevin LoGuidice, April 1998
Introduction:
·
Authentication is the process of verifying a user's identity on a system. Password based authentication is not suitable for computer networks as passwords sent across the wire can be compromised and subsequently used to impersonate the user.Goal:
·
A strong authentication mechanism based on cryptography that allows a process, running on behalf of a user (i.e. a client), to prove its identity to a verifier (i.e. a server) without disclosing the user's password.Advantages:
·
Data ConfidentialityProtocol:
| AS = Authentication Service | TGS = Ticket Granting Service |
| c = client name | s = server name |
| n = rand # | Tc,s = Ticket |
| Kc = client private key | Ks = server private key |
| Kc,s = session key | Kc,tgs = TGS session key |
| {} = encryption |
·
Basic Authentication Protocol·
Complete Authentication Protocol·
Inter-Realm Authentication ProtocolDisadvantages:
·
Trusted and reliable secret key online authentication server (i.e. single point of failure)Performance:
·
More computationally efficient than public-key cryptosystems (i.e. symmetric).Questions