a methodology for analyzing the performance of authentication protocols

30
Analyzing the Performance of Authentication Protocols 1 A Methodology for Analyzing the performance of Authentication Protocols Alan Harbitter Daniel A. Menasce Presented by Rob Elkind

Upload: aelwen

Post on 08-Feb-2016

34 views

Category:

Documents


0 download

DESCRIPTION

A Methodology for Analyzing the performance of Authentication Protocols. Alan Harbitter Daniel A. Menasce. Presented by Rob Elkind. Outline. Introduction Kerberos – and extensions Kerberos with Proxy Methodology Simulations – Multiple Realm and Mobile with proxy Conclusion. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

1

A Methodology for Analyzing the performance of Authentication

ProtocolsAlan HarbitterDaniel A. Menasce

Presented byRob Elkind

Page 2: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

2

Outline• Introduction• Kerberos – and extensions• Kerberos with Proxy• Methodology • Simulations – Multiple Realm and Mobile

with proxy• Conclusion

Page 3: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

3

Introduction

• Use of new modeling methodology for analyzing authentication protocols – Closed queuing network model

• Two Kerberos examples will be tested• Designed to explicitly model performance

new protocol design including asymmetric and symmetric encryption

Page 4: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

4

Kerberos Overview

Page 5: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

5

Kerberos Realms• Kerberos realms - networked collection of workstations,

servers, and a single master KDC which must: • 1. maintain a database of matching user IDs and hashed

passwords for registered Kerberos users• 2. maintain shared secret keys with each registered

application server• 3. maintain shared secret keys with remote KDCs in other

realms• 4. propagate new or changed secret keys and database

updates to slave KDCs.

Page 6: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

6

Public Key Cryptography

• Increase scalability• Smaller key shared space ~ n2 vs. n for n

users• Improved Security• Proposals:

– PKINIT (core specification)– PKCROSS– PKTAPP

Page 7: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

7

PKINIT Overview

Page 8: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

8

PKCROSS Overview

Page 9: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

9

PKDA Overview (PKTAPP)

Page 10: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

10

Proxy server with Kerberos

• Isolate client and server for security purposes

• Offload processing from mobile host or network

• IAKERB• Charon

Page 11: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

11

Methodology

• Build model• Validate• Change parameters• Analyze results• Add “What ifs”

Page 12: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

12

Modeling Topology multiple-realm

Page 13: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

13

Validation of Model

Page 14: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

14

“What-If” Analyses

• Vary input parameters to reflect various real world conditions

• Reflects sensitivity to various operational environments

• Gives insight into general performance characteristics of the protocol design

Page 15: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

15

Analysis of Public-Key-Enabled Kerberos in Large Networks

• Compare PKTAPP and PKCROSS• Simulate using closed queuing network

model• Use skeleton software to model real world

protocol• When is it more efficient to authenticate to

a central KDC than to individual application servers?

Page 16: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

16

Page 17: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

17

Page 18: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

18

PKCROSS vs. PKTAPP

Page 19: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

19

“What-Ifs” Results

Page 20: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

20

Analysis Of Public-key-enabled Kerberos InMobile Computing Environments

• Reduce the number of public/private key operations performed on the mobile platform.

• When a proxy is used, maintain the option to preserve the encrypted data stream through the proxy.

• Retain the standard Kerberos formats for messages sent to the KDC and application server.

• Preserve the semantics of Kerberos.

Page 21: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

21

M-PKINIT

Page 22: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

22

MP-PKINIT

Page 23: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

23

Modeling Topology M&MP-PKINIT

• Can use same model as before – Substitute a mobile client for client– Wireless network for LAN– Proxy server for local KDC

• Adjust branching probabilities to reflect new model paths

Page 24: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

24

Model Results

Page 25: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

25

Model vs. Simulation

Page 26: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

26

“What-If” Analysis

Page 27: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

27

More “What-Ifs”

Page 28: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

28

Conclusions

• Closed queuing model with class switching is a useful tool for analyzing performance in security protocols – supports wide range of operating conditions

• Skeleton implementation is a good way to work with new ideas that may not be operational yet

• PKCROSS outperforms PKTAPP for authenticating to more than one server

• Proxy server benefits 2G speeds but not 3G speeds

Page 29: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

29

Thoughts

• Well written and presented, clear and detailed

• Good procedural methodology• Would be nice to see “What-Ifs” done on

the test bed and compared to model as well• Skeleton makes assumptions that may alter

results when performed with real implementation

Page 30: A Methodology for Analyzing the performance of Authentication Protocols

Analyzing the Performance of Authentication Protocols

30

Questions?