An Introduction to Kerberos

Click here to start

Table of contents

An Introduction to Kerberos

What this talk is about

What this talk is not about

What is Kerberos?

Slide 5

Kerberos: etymology

PowerPoint Presentation

Fluffy, the 3 headed dog, from ÒHarry Potter and the Sorcerers StoneÓ

Some Kerberos benefits

So, what is Authentication?

Password based Authentication

Cryptographic Authentication

Encryption and Decryption

Symmetric Key Cryptography

Asymmetric Key Cryptography

Communicating Parties

Simple shared-secret based cryptographic authentication

Add mutual authentication

Problems with this scheme

Mediated Authentication

Slide 21

Slide 22

Slide 23

Kerberos uses timestamps

Kerberos (roughly)

Needham-Schroeder Protocol

Kerberos (detailed)

Kerberos ÒprincipalÓ

Kerberos without TGS

Slide 30

Slide 31

Slide 32

Combining 2 previous diags

Slide 34

Review: Kerberos Credentials

Ticket Granting Service (TGS)

Slide 37

Slide 38

Kerberos with TGS

TGS Benefits

Slide 41

Slide 42

Slide 43

Slide 44


Slide 46

Kerberos & Two-factor auth

Kerberos: summary

Advantages of Kerberos (1)

Advantages of Kerberos (2)

Kerberos caveats


References (cont)

Questions or comments?

Author: Shumon Huque

Further information:
ISC Networking & Telecommunication

Best viewed with