SlideShare uma empresa Scribd logo
1 de 26
Kerberos
In Greek mythology, a many headed dog, the
guardian of the entrance of Hades
Example of Kerberos Idea
A
C
B
Now I can deal
with A by using
our shared key
• Kerberos is a protocol for authenticating service
requests between trusted hosts across an
untrusted network, such as the internet.
• Kerberos is built in to all major operating
systems, including Microsoft Windows, Apple
OS X, FreeBSD and Linux.
Kerberos Protocol XYZService
KeyDistributionCenter(KDC)
1.Generate Session Key
2. Create XYZ credential ticket
a. Encrypt with XYZ service key
(Password).
b. Create message(Current date time,
Session key).
3. Create User Response
a. Create message(Current date time,
Session XYZ credential ticket )
b. Encrypt with user key (Password)
1.Decrypt the response using
user key(password).
2.save the session key to be
used for any communication
to XYZ service .
3.Pass the service credential
ticket to the XYZ service
KeyDistributionCenter(KDC)
XYZservice
Kerberos Protocol
1. Decrypt the response using
XYZ service key (password).
2. Save the session key to be
used for any communication
to the user.
3. Send successful response
encrypted with the session
key .
1. First service access is Ticket Granting Service (TGS)
service to get Ticket Granting Ticket (TGT)
a. Single sign on
b. Allow user to use biometric, finger print and smart
card .
2. If we considered that user is delegated by the KDC to
XYZ service, with the same concept the user can delegate
XYZ service to deal with another service on behalf of
him.
Kerberos Protocol
KeyDistribution
Center(KDC)
Authentication
service(AS)
Ticket Granting
Service (TGS)
Public Key Infrastructure (PKI)
Binds public keys to entities , enables other entities to verify
public key bindings, Provides services for management of
keys in a distributed system
Goals:
protect and distribute information that is needed in a widely
distributed environment, where the users, resources and stake-
holders may all be in different places at different times
PKI-Public Key Infrastructure-PKI
1.How can we transfer public key /File Format?
PKI-Public Key Infrastructure-PKI
2. Who Create/Generate this Certificate
1.How can we transfer public key /File Format?
1. How can you trust this certificate ?
2.Does this site really belong to ..?
A trust B
B trust C
Then A will trust C
Certificateauthority(CA)
Trust
TrustedCA
Trust
Public
Certificateauthority(CA)
TrustedCA
PKI-Public Key Infrastructure-PKI
Public key
3.Does this certificate really generated by a Trusted CA?
Digital
signature(DS)
PKI-Public Key Infrastructure-PKI
Certificateauthority(CA)
TrustedCA
Issue Policy and Methods Distribution policy and Method
Certificate
Backup
How to know google chrome certificates
Choose
advanced
settings
then choose
certificates
This page will appear
it has all certificates
classified
Choose any tap you
want to see
Here I choose the first
certificate, and what
appeared is the
certificate itself.
It shows the what it is
used for, the publisher
and dates.
Alternatives
Web of trust
An alternative approach to the problem of public authentication
of public key information is the web-of-trust scheme, which uses
self-signed certificates and a trusted third party for those
certificates.
Examples :
oPGP (Pretty Good Privacy)
oOpenPGP
The web of trust concept was first put by PGP creator Phil
Zimmermann in 1992 for PGP
PGP company owned the rights to the original PGP
encryption software. released in 1991 to ensure the security
of files that were posted on internet From 1997 until 2010,
the software changed several times until it was Bought by
Symantec Corp., who continues to develop the PGP.
PGP encryption uses a combination of encryption
methodologies such as hashing, data compression,
symmetric-key cryptography and public key cryptography.
PGP allow the use of e-mail digital signatures for self-
publication of public key information, this what make it
easy.
Zimmerman soon began work on an openPGP (open-
source version of PGP) encryption that uses encryption
algorithms that had no licensing issues.
Alternatives
Simple Public Key Infrastructure
public key certificate format, associated signature and key
acquisition protocols are to be simple to understand,
implement, and use. The resulting formats and protocols are to
be known as the Simple Public Key Infrastructure, or SPKI.
The SPKI is intended to provide mechanisms to support
security in a wide range of internet applications as electronic
mail and WWW documents, payment protocols, and any other
application which will require the use of public key
certificates.
What is Digital Identity ?
Digital Identity : The electronic representation of
an entity within a domain of application.
Entity : A person, a group of persons, an
organization or even a device that is capable of
doing a transaction.
Domain Of Application : The area of application
where a digital identity has its validity
Identifiers :A digital identity is composed of
identifiers or attributes. Examples are Date Of
Birth, ID.
Credentials : It is anything a user can possess.
Examples are a password, answer to a question,
his eye or his voice
Federated identity management
using the same set of standards across different organizations to
manage users identity.
With the increased integration of Internet in our life users,
suppliers, retailers all are accessing services of many
organizations to increase their business and get the best of what is
available, but one organization does not trust the identities of
another organization.
So the user ends up making several user-IDs and passwords.
This is very inefficient, costly and not at all user friendly. FIM
provides standards that help the identities to cross organizational
boundaries and to be shared by many organizations. FIM allows
the subscriber to use the same identity to access networks of
different organizations. Some of the first adopters of FIM were
Boeing, General Motors and Nokia
Identity Management Evolution : Identity Management
(IM) refers to procedure of handling the lifecycle of a
digital identity its creation, maintenance and deleting a
digital identity. IM has to also deal with authentication
procedure and access control policy.
Identity Provider (IDP) is a service or an organization
that is responsible for authentication of user.
Single Sign On (SSO) is a process where user gains
access to several services after successful authentication .
FIM challenges
Although progress have been made in FIM but there are some
challenges that are faced by FIM. They are as follows :
Identity theft : the theft of an identity represents one of the main
issues as it remains undetected till the damage has been done. In most
of the cases identity theft does not occur at the Identity Provider. It
mostly occurs on the users end.
FIM challenges
Privacy guarantee and legal compliance :
In some countries there are laws to protect users personal
information against bad use. The current FIM have weak
definitions in how a user should protect is personal information.
A standard is proposed by W3C for websites to tell their practices
of personal information collection, use and distribution. These
policies should be read by the web browser or the user and must
be accepted.
Peer To Peer (P2P) application :
Support Use of P2P applications
has increased very fast. FIM use
in P2P environment will provide
more security but FIM is based
on client/server model.
*note: client/server model
which the client makes a service
request and the server fulfills
the request, the P2P network
model allows each node to
function as both a client and
server.
Thank you for your attention !!
This presentation by :
Wafa Al-salman
Sara Al-sughaeir

Mais conteúdo relacionado

Mais procurados

Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI PlatformEvernym
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEvernym
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web SecurityOliver Pfaff
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 

Mais procurados (20)

Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Enhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital CredentialsEnhancing Learner Mobility with SSI & Portable Digital Credentials
Enhancing Learner Mobility with SSI & Portable Digital Credentials
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 

Semelhante a Kerberos-PKI-Federated identity

Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafePixlogix Infotech
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 

Semelhante a Kerberos-PKI-Federated identity (20)

Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
120 i143
120 i143120 i143
120 i143
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Loqr
LoqrLoqr
Loqr
 

Último

Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑Damini Dixit
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Servicenishacall1
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flyPRADYUMMAURYA1
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicinesherlingomez2
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Joonhun Lee
 

Último (20)

Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
 

Kerberos-PKI-Federated identity

  • 1. Kerberos In Greek mythology, a many headed dog, the guardian of the entrance of Hades
  • 2. Example of Kerberos Idea A C B Now I can deal with A by using our shared key
  • 3. • Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. • Kerberos is built in to all major operating systems, including Microsoft Windows, Apple OS X, FreeBSD and Linux.
  • 4. Kerberos Protocol XYZService KeyDistributionCenter(KDC) 1.Generate Session Key 2. Create XYZ credential ticket a. Encrypt with XYZ service key (Password). b. Create message(Current date time, Session key). 3. Create User Response a. Create message(Current date time, Session XYZ credential ticket ) b. Encrypt with user key (Password) 1.Decrypt the response using user key(password). 2.save the session key to be used for any communication to XYZ service . 3.Pass the service credential ticket to the XYZ service
  • 5. KeyDistributionCenter(KDC) XYZservice Kerberos Protocol 1. Decrypt the response using XYZ service key (password). 2. Save the session key to be used for any communication to the user. 3. Send successful response encrypted with the session key .
  • 6. 1. First service access is Ticket Granting Service (TGS) service to get Ticket Granting Ticket (TGT) a. Single sign on b. Allow user to use biometric, finger print and smart card . 2. If we considered that user is delegated by the KDC to XYZ service, with the same concept the user can delegate XYZ service to deal with another service on behalf of him. Kerberos Protocol KeyDistribution Center(KDC) Authentication service(AS) Ticket Granting Service (TGS)
  • 7. Public Key Infrastructure (PKI) Binds public keys to entities , enables other entities to verify public key bindings, Provides services for management of keys in a distributed system Goals: protect and distribute information that is needed in a widely distributed environment, where the users, resources and stake- holders may all be in different places at different times
  • 8. PKI-Public Key Infrastructure-PKI 1.How can we transfer public key /File Format?
  • 9. PKI-Public Key Infrastructure-PKI 2. Who Create/Generate this Certificate 1.How can we transfer public key /File Format? 1. How can you trust this certificate ? 2.Does this site really belong to ..? A trust B B trust C Then A will trust C Certificateauthority(CA) Trust TrustedCA Trust Public
  • 10. Certificateauthority(CA) TrustedCA PKI-Public Key Infrastructure-PKI Public key 3.Does this certificate really generated by a Trusted CA? Digital signature(DS)
  • 11. PKI-Public Key Infrastructure-PKI Certificateauthority(CA) TrustedCA Issue Policy and Methods Distribution policy and Method Certificate Backup
  • 12. How to know google chrome certificates
  • 14. This page will appear it has all certificates classified Choose any tap you want to see
  • 15. Here I choose the first certificate, and what appeared is the certificate itself. It shows the what it is used for, the publisher and dates.
  • 16. Alternatives Web of trust An alternative approach to the problem of public authentication of public key information is the web-of-trust scheme, which uses self-signed certificates and a trusted third party for those certificates. Examples : oPGP (Pretty Good Privacy) oOpenPGP
  • 17. The web of trust concept was first put by PGP creator Phil Zimmermann in 1992 for PGP PGP company owned the rights to the original PGP encryption software. released in 1991 to ensure the security of files that were posted on internet From 1997 until 2010, the software changed several times until it was Bought by Symantec Corp., who continues to develop the PGP. PGP encryption uses a combination of encryption methodologies such as hashing, data compression, symmetric-key cryptography and public key cryptography. PGP allow the use of e-mail digital signatures for self- publication of public key information, this what make it easy. Zimmerman soon began work on an openPGP (open- source version of PGP) encryption that uses encryption algorithms that had no licensing issues.
  • 18. Alternatives Simple Public Key Infrastructure public key certificate format, associated signature and key acquisition protocols are to be simple to understand, implement, and use. The resulting formats and protocols are to be known as the Simple Public Key Infrastructure, or SPKI. The SPKI is intended to provide mechanisms to support security in a wide range of internet applications as electronic mail and WWW documents, payment protocols, and any other application which will require the use of public key certificates.
  • 19. What is Digital Identity ? Digital Identity : The electronic representation of an entity within a domain of application. Entity : A person, a group of persons, an organization or even a device that is capable of doing a transaction. Domain Of Application : The area of application where a digital identity has its validity Identifiers :A digital identity is composed of identifiers or attributes. Examples are Date Of Birth, ID. Credentials : It is anything a user can possess. Examples are a password, answer to a question, his eye or his voice
  • 20. Federated identity management using the same set of standards across different organizations to manage users identity. With the increased integration of Internet in our life users, suppliers, retailers all are accessing services of many organizations to increase their business and get the best of what is available, but one organization does not trust the identities of another organization. So the user ends up making several user-IDs and passwords. This is very inefficient, costly and not at all user friendly. FIM provides standards that help the identities to cross organizational boundaries and to be shared by many organizations. FIM allows the subscriber to use the same identity to access networks of different organizations. Some of the first adopters of FIM were Boeing, General Motors and Nokia
  • 21.
  • 22. Identity Management Evolution : Identity Management (IM) refers to procedure of handling the lifecycle of a digital identity its creation, maintenance and deleting a digital identity. IM has to also deal with authentication procedure and access control policy. Identity Provider (IDP) is a service or an organization that is responsible for authentication of user. Single Sign On (SSO) is a process where user gains access to several services after successful authentication .
  • 23. FIM challenges Although progress have been made in FIM but there are some challenges that are faced by FIM. They are as follows : Identity theft : the theft of an identity represents one of the main issues as it remains undetected till the damage has been done. In most of the cases identity theft does not occur at the Identity Provider. It mostly occurs on the users end.
  • 24. FIM challenges Privacy guarantee and legal compliance : In some countries there are laws to protect users personal information against bad use. The current FIM have weak definitions in how a user should protect is personal information. A standard is proposed by W3C for websites to tell their practices of personal information collection, use and distribution. These policies should be read by the web browser or the user and must be accepted.
  • 25. Peer To Peer (P2P) application : Support Use of P2P applications has increased very fast. FIM use in P2P environment will provide more security but FIM is based on client/server model. *note: client/server model which the client makes a service request and the server fulfills the request, the P2P network model allows each node to function as both a client and server.
  • 26. Thank you for your attention !! This presentation by : Wafa Al-salman Sara Al-sughaeir