February 25, 2020, 08:59:24 am

Net security

Started by TechShristi, October 16, 2011, 11:11:14 am

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

TechShristi

October 16, 2011, 11:11:14 am Last Edit: January 01, 1970, 05:30:00 am by Guest
Quotefive report on Net security

Kerberos is a network authentication system for use on physically insecure networks, based on the key distribution model presented by Needham and Schroeder. It allows entities communicating over networks to prove their identity to each other while preventing eavesdropping or replay attacks. It also provides for data stream integrity (detection of modification) and secrecy (preventing unauthorized reading) using cryptography systems such as DES.


A process associated with scrambling plain text (ordinary text, or clear text) into cipher text (a process called encryption), then back again (known as decryption). Cryptography concerns itself with four objectives:                   1) Confidentiality (the information cannot be understood by anyone for whom it was unintended)                                  2) Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected)                3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information)             4) Authentication (the sender and receiver can confirm each others identity and the origin/destination of the information)                      Procedures and protocols that meet some or all of the above criteria are known as cryptosystems


Kerberos  works by providing principals (users or services) with tickets that they can use to identify themselves to other principals and secret cryptographic keys for secure communication with other principals. A ticket is a sequence of a few hundred bytes. These ticket can then be embedded in virtually any other network protocol, thereby allowing the processes implementing that protocol to be sure about the identity of the principals involved.


It is important to realize that Kerberos is a one-trick pony. It provides for mutual authentication and secure communication between principals on an open network by manufacturing secret keys for any requestor and providing a mechanism for these secret keys to be safely propagated through the network. Kerberos does not, per se, provide for authorization or accounting, although applications that wish to can use their secret keys to perform those functions securely. Kerberos also does not provide password validation for individual workstations unless care is taken.

TechShristi

October 16, 2011, 11:11:14 am Last Edit: January 01, 1970, 05:30:00 am by Guest

Quick Reply

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.

Note: this post will not display until it's been approved by a moderator.

Name:
Email:
Verification:
Please leave this box empty:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:

Shortcuts: ALT+S save/post or ALT+P preview