Click here to start

Table of contents

Authentication in real world: Kerberos, SSH and SSL

Where are we?

Think about Authentication

Use of Password over a Network

Use of Challenges to Defend Against Password Replay

The “O(N2) Password Management Problem”

What is Kerberos?

Kerberos: etymology

How Kerberos Tickets Work (Daily Experience)

Kerberos Authentication

Kerberos Terminology and Abbreviations

Kerberos Authentication (Detail)

Kerberos Authentication w/ TGS

Kerberos Authentication w/ TGS (Detail)

Kerberos’ Stateless Model

Scaling Kerberos

Kerberos Authorization and Accounting

Advantages of Kerberos

Kerberos caveats

Summary of Kerberos

Ssshhhhh....

Simplified SSH Protocol

Actual SSH Protocol

Comparing to stored KUS

Accept and Save

ssh philosophy

ssh.com’s SSH

ssh Error

ISO/OSI Model SSL: Security at Transport Layer

Security at the Transport Layer Secure Socket Layer (SSL)

Secure Socket Layer (SSL)

An example of key exchange using public/private keys

Acknowledgements

Author: Zheng Ma

E-mail: zheng.ma@yale.edu