Title: Efficient Kerberized Multicast
1Efficient Kerberized Multicast
- Olga Kornievskaia
- University of Michigan
- Giovanni Di Crescenzo
- Telcordia Technologies
2Outline
- Efficient cross realm authentication in Kerberos
- Review original Kerberos
- Propose a new extension for distributed
operations in Kerberos - Multi-center multicast encryption schemes
- Review single center schemes
- Extend common schemes to distributed setting
- Integrating Kerberos with multicast encryption
schemes
3Motivation
- Increasing interest in group communication
applications - Audio and video conferencing, data casting,
collaborative applications - Problem security
- Goal provide a practical solution
4System Model
Intranet
slow
Internet
Intranet
Intranet
fast
5Kerberos
- Based on Needham and Schroeder protocol
- Doesnt use asymmetric key crypto (fast)
- Relies on a trusted third party (KDC)
- Authentication is based on special data
structures - tickets - Notation
- KDC Key Distribution Center
- TGS Ticket Granting Service
- Alice, Bob Kerberos principals
- KA,B Key shared by Alice and Bob
- KA Key derived from Alices password
- TGT Ticket granting ticket
- T - nonce (timestamp) used to protect again
replay attacks -
6Kerberos Login Phase
KDC
Alice
7Kerberos Service Ticket Request
TGS
Alice
Bob
8Kerberos Application Request
KDC
Alice
Bob
9Distributed Operations in Kerberos
- Multiple Kerberos realms
- Each realm administers local principals
- No replication of data
- Off-line phase
- Shared keys established between participating
KDCs - Ex Wonderland and Oz
- KW,Oz shared key between KDCs
- Alice_at_Wonderland, Bob_at_Oz
10Cross Realm Kerberos Local Request
TGS_at_Wonderland
Alice_at_Wonderland
Bob_at_Oz
11Cross Realm Kerberos Remote Req
TGS_at_Oz
Alice_at_Wonderland
Bob_at_Oz
12Cross Realm Kerberos
Alice_at_Wonderland
Bob_at_Oz
13Efficient Cross Realm Protocol
- Can we improve
- Network delays
- KDC workload
- Client workload
- Compatible with non-distributed version of
Kerberos
14Fake Ticket Protocol Step 1
TGS_at_Wonderland
Alice_at_Wonderland
Bob_at_Oz
15Protocol Step 2
Alice_at_Wonderland
Bob_at_Oz
16Protocol Step 3
TGS_at_Oz
Alice_at_Wonderland
Bob_at_Oz
17Evaluation
- Minimizes the number of Internet (slow) messages
- Reduced the workload on the client (Alice)
- Alices software doesnt need to be modified
- Extends easily to sending a message to a group
18Outline
- Efficient cross realm authentication in Kerberos
- Multi-center multicast encryption schemes
- Integrating Kerberos with multicast encryption
schemes
19Multicast Encryption
- Methods for performing secure communication among
a group of users - Key management problem
- Join/leave operations
- Non-collaborative schemes
- Single center responsible for managing keys
- Schemes evaluated based on
- Communication complexity
- Storage complexity (both center and user)
20Minimal Storage Scheme
- Users store two keys
- KG - group key
- KI,C - individual key shared with the center
- Center stores two keys
- KG - group key
- KM secret key used to generate individual
users key - Key update operation has linear communication cost
21Tree-based Schemes
- Build a logical tree
- Each node represents a key
- Root group key
- Leaves individual user keys
- User stores all keys on the path from the leave
to the root - User storage complexity is logarithmic
- Center stores all keys in the tree
- Center storage complexity is linear
22Tree-based Schemes (cont.)
- Key update operation requires logarithmic number
of messages - Change all keys on the path from the removed
leave - Use siblings keys to distributes new keys
23Multi-center Multicast First Look
- Multiple centers managing separate sets of
clients - Build a single binary tree
- Replicate tree at each center
- Key updates require only local communication
- Inefficient center and user storage
- Total center storage is O(n2)
- Each center stores keys for clients it doesnt
manage
24Extended Tree-based Multi-center
- Each center manages M users
- Each center builds a logical tree (size M)
- Each user stores O(log M) keys
- All centers share a key, KC
- Key update operation requires (log M N/M)
message - Center storage among all centers is linear
25Huffman Tree-based Multi-center
- Each center has different number of users
- Binary tree schemes doesnt provide an optimal
tree - Each center builds a local tree
- Associate a codeword with each center
- Run Huffman algorithm to obtain minimal tree
- Tree structure is kept by all centers
26Outline
- Efficient cross realm authentication in Kerberos
- Multi-center multicast encryption schemes
- Integrating Kerberos with multicast encryption
schemes
27Integration of Kerberos with Multicast Schemes
- Need to extend Kerberos to sending a message to a
group - N clients
- Each KDC manages M clients
- Notation
- KG group key
- KC key shared among all KDCs
28Kerberized Multicast
Alice
29Integration Illustrated
Alice
30Integration Illustrated (cont)
Alice
31Integration Illustrated (cont)
Alice
32Kerberized Multicast with Fake Tickets
Alice
33Integration Illustrated
Alice
34Integration Illustrated (cont)
Alice
35Integration Illustrated (cont)
Alice
36Conclusion
- Presented an extension to Kerberos for cross
realm authentication - Eliminates Internet (slow) communications
- Presented an extension to multicast encryption
schemes that optimizes for multiple centers - Explored integrating cross realm authentication
with multicast encryption schemes