user authentication by eric sita. message security privacy: to expect confidentiality from a sender....

13
User Authentication User Authentication By Eric Sita

Upload: shannon-gregory

Post on 29-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

User AuthenticationUser Authentication

By Eric Sita

Page 2: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity
Page 3: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Message SecurityMessage Security

Privacy: To expect confidentiality from a sender.

Authentication: To be sure of someone's identity.

Integrity: Make sure message arrives as sent.

Nonrepudiation: To prove a message came from a particular sender.

Page 4: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Methods CoveredMethods Covered

Use of a symmetric KeyUsing a nonceBi-directionalSSH example

Page 5: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Symmetric KeySymmetric Key

Page 6: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Using a nonceUsing a nonce

Page 7: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Bi-directional Bi-directional

Page 8: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Example SystemExample System

SSH – Used for our UNIX accounts Consists of three protocols:

1) SSH-TRANS -Transport Layer Protocol

2) SSH-AUTH - Authentication Protocol

3) SSH-CONN - Connection Protocol

Page 9: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

SSH-TRANSSSH-TRANS

Provide an encrypted channel between client and server

Runs on top of a TCP connectionThis is first step in logging on to systemUses RSA to authenticateEstablish a session key

Page 10: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

SSH-AUTHSSH-AUTH

Three methods:1) Since connection is secure send password

2) Public key encryption

3) Host-based authentication

Page 11: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Extra Info on SSHExtra Info on SSH

OpenSSH a package on most UNIX systems supports the command, “SSH-keygen” to create private/public key pairs

Is used on other TCP applications like X Windows and IMAP mailers, otherwise known as “SSH tunnel”

This is called Port Forwarding, used in the SSH-CONN protocol

Page 12: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

Applicationclient

Applicationserver

SSH SSHForwarded connection

Direct connection

Host A Host B

SSH ExampleSSH Example

Page 13: User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity

ReferencesReferences

Forouzan, Behrouz Data Communications and Networking McGraw-Hill 2004

Peterson, Larry Computer Networks A Systems Approach Morgan Kaufman 2003

Leon-Garcia, Alberto Communication Networks McGraw-Hill 2000