10
The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Embed Size (px)

Citation preview

Page 1: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

The Design and Implementation of

a tutorial to illustrate theKerberos protocol

Presenter : Lindy Carter

Supervisors : Peter Wentworth

John Ebden

Page 2: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Kerberos - Some Background…

Trusted third party network authentication protocol.

Implemented in Windows 2000 over the Response Authentication Protocol that Windows NT used.

Uses symmetric key cryptography. Contains 3 “separate” parts –

Authentication Server, Ticket Granting Service and the server.

Page 3: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Background cont…

Central security server shares keys with each controlled resource.

Makes use of authentication tickets that are granted to users.

Both client and server can be authenticated.

Page 4: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

The Problem

Difficult to understand and demonstrate.

Page 5: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

The aim

Build a web based tutorial which will teach the Kerberos protocol in an effective way.

Tutorial must be able to be extended to cater for other protocols with only slight modification – most security protocols have similar features.– Locks and keys– Message passing

Page 6: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Design Considerations and Implementation Issues

Read up on Kerberos and understand the protocol thoroughly – Read up on other security protocols and try to relate

them to Kerberos.

Examine existing tutorials and see what teaching methods are used.

Consider FAQ’s to try and understand where the problems lie– an indication of what areas to concentrate on

• e.g. why do the system clocks need to be synchronized

Page 7: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Design Considerations and Implementation issues cont Decide on a metaphor on which a physical

model can be based.– Must take into account the other protocols– Final product to be based on the model

Identify how student can be involved in learning process

Build the physical model Implement using Java

Page 8: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

The Output

Physical model. Web based tutorial. Some sort of generic platform on which

other authentication protocol tutorials can be based.

Page 9: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

Possible extensions

The implementation of tutorials for other authentication protocols

Other generic platforms to build tutorials for other types of protocols

Page 10: The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

????Questions

?????