第6章身份认证与数字签名ppt课件.ppt
《第6章身份认证与数字签名ppt课件.ppt》由会员分享,可在线阅读,更多相关《第6章身份认证与数字签名ppt课件.ppt(88页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、第6章 身份认证与数字签名主要内容 v 身份认证v 数字签名6.1 身份认证 v身份认证是验证主体的真实身份与其所声称的身份是否符合的过程。v认证的结果只有两个:符合和不符合。v适用于用户、进程、系统、信息等。身份认证的例子v邮件登录vClient与Server之间的鉴别vTelnet远程登录vFtp服务v登录到某台电脑上身份认证系统的组成 v出示证件的人,称作示证者P(Prover),又称声称者(Claimant)。v验证者V(Verifier),检验声称者提出的证件的正确性和合法性,决定是否满足要求。v第三方是可信赖者TP(Trusted third party),参与调解纠纷。在许多应用
2、场合下没有第三方。6.1.1 身份认证的物理基础 vSomething the user know (例如口令) 在互连网和计算机领域中最常用的认证方法是口令认证 简单,但不安全。口令有可能被窃取、丢失、复制。 v设计依据安全水平、系统通过率、用户可接受性、成本等v口令一般并不是以明文的形式存在和使用,而是采用一些加强的处理之后才使用的。 对口令加密:对口令的加密算法必须是单向的,即只能加密,不能解密。在验证用户的口令时,验证方用单向函数加密,并与存储的密文相比较,若相等,则确认用户的身份有效,否则确认用户身份无效。 一次性口令:使用一次性口令作为身份认证方法,使得中途截获口令变得毫无意义。由
3、于要产生大量的一次性口令,所以必须采用专用的设备来产生口令。 身份认证的物理基础 vSomething the user possesses(例如证件)认证系统相对复杂用户所拥有的用户所拥有的 v磁卡或智能卡丢失,那么捡到卡的人就可以假冒真正的用户。 v需要一种磁卡和智能卡上不具有的身份信息,这种身份信息通常采用个人识别号PIN。持卡人必须自己妥善保存并严格保密。v在验证过程中,验证者不但要验证持卡人的卡是真实的卡,同时还要通过PIN来验证持卡人的确是他本人。 身份认证的物理基础vSomething the user is(例如指纹识别)更复杂,而且有时会牵涉到本人意愿6.1.2 身份认证方式
4、 v单向认证(One-way Authentication)v双向认证(Two-way Authentication)v信任的第三方认证(Trusted Third-party Authentication) 单向认证 v通信的一方认证另一方的身份 用对称密码体制来实现单向认证 v某函数变换fv双方共享的密钥KSv随机数RA用非对称密码体制来实现单向认证 v随机数RAvB的私钥KSB双向认证双向认证 v双方都要提供用户名和密码给对方,才能通双方都要提供用户名和密码给对方,才能通过认证。过认证。 用对称密码体制来实现双向认证 vA产生一个随机数RAv双方共享的密钥KSvB产生一个随机数RB用非对
5、称密码体制来实现双向认证 vA产生一个随机数RAvB产生一个随机数RBvB的私钥KSBvA的私钥KSA信任的第三方认证信任的第三方认证 v当两端欲进行连线时,彼此必须先通过信任第三方的认证,然后才能互相交换密钥,而后进行通信 一种第三方认证机制 vSKAU:管理员的私钥 vPKB:B的公钥vPKA:A的公钥vN1: A的临时交互号vN2: B产生的新临时交互号6.1.3 kerberos协议概述vKerberos是一种计算机网络认证协议,它允许某实体在非安全网络环境下通信,向另一个实体以一种安全的方式证明自己的身份。v它也指由麻省理工实现此协议,并发布的一套免费软件。v它的设计主要针对客户-服
6、务器模型,并提供了一系列交互认证-用户和服务器都能验证对方的身份。vKerberos协议可以保护网络实体免受窃听和重复攻击。vKerberos协议基于对称密码学,并需要一个值得信赖的第三方。vIn Greek mythology, a many headed dog, commonly three, perhaps with a serpents tail, the guardian of the entrance of Hades. - Dictionary of Subjects and Symbols in Art, by James Hall, Harper & Row, 1979.
7、Key Points vKerberos is an authentication service designed for use in a distributed environment.vKerberos makes use of a trusted third-part authentication service that enables clients and servers to establish authenticated communication.InstructionvOne of the earliest and also one of the most widely
8、 used services.vTwo versions of Kerberos are in common use. Version 4 implementations still exist. Version 5 corrects some of the security deficiencies of version 4 and has been issued as a proposed Internet Standard (RFC 1510). The problem that Kerberos addresses: vAssume an open distributed enviro
9、nment in which users at workstations wish to access services on servers distributed throughout the network. vWe would like for servers to be able to restrict access to authorized users and to be able to authenticate requests for service. vKerberos provides a centralized authentication server whose f
10、unction is to authenticate users to servers and servers to users. v Kerberos relies exclusively on symmetric encryption, making no use of public-key encryption. A Simple Authentication Dialogue vIn an unprotected network environment, any client can apply to any server for service. vservers must be a
11、ble to confirm the identities of clients who request service. Each server can be required to undertake this task for each client/server interaction.vIn an open environment, this places a substantial burden on each server. Authentication Server (AS) vAn alternative is to use an authentication server
12、(AS) that knows the passwords of all users and stores these in a centralized database. vThe AS shares a unique secret key with each server. These keys have been distributed physically or in some other secure manner. 存储每个用户的password和标识存储与每个服务器共享的密钥AS查询数据库,检查用户口令是否与用户表示相符,并判断此用户是否有访问服务器V的权限。(1) C AS:
13、IDC|PC|IDV(2) AS C: Ticket(3) C V: IDC|TicketTicket = E(Kv, IDC|ADC|IDV)C= client AS= authentication ServerV=server IDC= identifier of user on CIDV= identifier of V PC= password of user on CADC= network address of CKv= secret encryption key shared by AS and VvAlthough the foregoing scenario solves s
14、ome of the problems of authentication in an open network environment, problems remain. Two in particular stand out. we would like to minimize the number of times that a user has to enter a password. Suppose each ticket can be used only once. The second problem is that the earlier scenario involved a
15、 plaintext transmission of the password.A More Secure Authentication Dialogue v把身份认证和访问权限交给两个服务器分别完成身份认证,由AS完成访问控制,由票据授权服务器(ticket-granting server,TGS)来完成v达到的效果:用户口令只需输入一次,且不会在网络上传输。存储每个用户的password和标识存储与TGS共享的密钥Tickettgs由kc加密, kc来自password存储与每个服务器V共享的密钥判断此用户是否有访问服务器V的权限。Once per user logon session:
16、(1) C AS: IDC|IDtgs (2) AS C: E(Kc, Tickettgs)Once per type of service: (3) C TGS: IDC|IDV|Tickettgs (4) TGS C: TicketvOnce per service session: (5) C V:IDC|TicketvTickettgs = E(Ktgs, IDC|ADC|IDtgs|TS1|Lifetime1)Ticketv = E(Kv, IDC|ADC|IDv|TS2|Lifetime2)(3) C TGS: IDC|IDV|TickettgsTickettgs = E(Ktgs
17、, IDC|ADC|IDtgs|TS1|Lifetime1)1. 客户端将用户标识、TGS标识一起送往AS,申请得到票据授权票据ticket-granting ticket。2. AS用从用户口令推出的密钥Kc(事先已经存储在AS中)将票据加密,并发送给客户端。由用户在客户端输入口令,并得到Kc,将收到的消息解密,得到票据授权票据ticket-granting ticket 。vThe client module in the user workstation saves this ticket-granting ticket. vBecause only the correct user s
18、hould know the password, only the correct user can recover the ticket. Thus, we have used the password to obtain credentials from Kerberos without having to transmit the password in plaintext. 3. The client requests a service-granting ticket(服务授权票据). For this purpose, the client transmits a message
19、to the TGS containing the users ID, the ID of the desired service, and the ticket-granting ticket. 4. The TGS decrypts the incoming ticket and verifies the success of the decryption by the presence of its ID. It checks to make sure that the lifetime has not expired. Then it compares the user ID and
20、network address with the incoming information to authenticate the user. If the user is permitted access to the server V, the TGS issues a ticket(service-granting ticket, Ticketv) to grant access to the requested service.5. The client requests access to a service on behalf of the user. For this purpo
21、se, the client transmits a message to the server containing the users ID and the service-granting ticket. The server authenticates by using the contents of the ticket.使用的密钥vKc: AS和C共享vKtgs:AS和TGS共享vKv: TGS和V共享Two problems vThe lifetime associated with the ticket-granting ticket: If this lifetime is
22、very short (e.g., minutes), then the user will be repeatedly asked for a password. If an opponent captures a service-granting ticket and uses it before it expires, the opponent has access to the corresponding service. A network service (the TGS or an application service) must be able to prove that t
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 身份 认证 数字签名 ppt 课件
限制150内