Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden.

Similar presentations


Presentation on theme: "The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden."— Presentation transcript:

1

2 The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden

3 Kerberos - Some Background…  Trusted third party network authentication protocol.  Implemented in Windows 2000 over the Response Authentication Protocol that Windows NT used.  Uses symmetric key cryptography.  Contains 3 “separate” parts – Authentication Server, Ticket Granting Service and the server.

4 Background cont…  Central security server shares keys with each controlled resource.  Makes use of authentication tickets that are granted to users.  Both client and server can be authenticated.

5 The Problem  Difficult to understand and demonstrate.

6 The aim  Build a web based tutorial which will teach the Kerberos protocol in an effective way.  Tutorial must be able to be extended to cater for other protocols with only slight modification – most security protocols have similar features. –Locks and keys –Message passing

7 Design Considerations and Implementation Issues  Read up on Kerberos and understand the protocol thoroughly –Read up on other security protocols and try to relate them to Kerberos.  Examine existing tutorials and see what teaching methods are used.  Consider FAQ’s to try and understand where the problems lie –an indication of what areas to concentrate on e.g. why do the system clocks need to be synchronized

8 Design Considerations and Implementation issues cont  Decide on a metaphor on which a physical model can be based. –Must take into account the other protocols –Final product to be based on the model  Identify how student can be involved in learning process  Build the physical model  Implement using Java

9 The Output  Physical model.  Web based tutorial.  Some sort of generic platform on which other authentication protocol tutorials can be based.

10 Possible extensions  The implementation of tutorials for other authentication protocols  Other generic platforms to build tutorials for other types of protocols

11 ???? Questions ?????


Download ppt "The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden."

Similar presentations


Ads by Google