Encryption_Types (2024)

Kerberos supports several types of encryption for securing session keysand the tickets. The type used for a particular ticket or session keyis automatically negotiated when you request a ticket or a service.

  • When encrypting tickets, the Key Distribution Center (KDC) for yourKerberos installation checks for an encryption type that is shared byboth the KDC and the service you are attempting to use.
  • When encrypting session keys, the KDC checks for an encryptiontype shared by the KDC, the service, and the client requesting thesession (you).
How to... Learn about...
  • View encryption types
  • Weak encryption types
  • Supported encryption types
  • Related help

Weak Encryption Types

In the table of Encryption Types below, some encryption types are noted as weak.Most of them are encryption types that used to be strong but now, withmore computing power available, are considered weak and thereforeundesirable. However, they are still sometimes used for backwardscompatibility. If Kerberos is installed in a network that contains someolder machines running operating systems that do not support the newerencryption types, administrators can choose to allow the weakerencryption when connecting to the older machines.

Back to Top

View Encryption Types

  1. Click the Options tab and find the View Options panel.
  2. Click the Encryption Type checkbox to select it. This opens theEncryption Type column in the main window, showing the encryption typeassociated with each of your tickets and session keys.
    How to: Use Ticket Options Panel
  3. Click and drag the line to the right of the Encryption Type columnheader to widen the column enough to see both the ticket and sessionkey.
  4. Click the blue triangle to the left of a principal name to see alltickets and session keys issued to that principal. Each ticket and keywill have an entry in the Encryption type column.
    How to: View Tickets

Back to Top

Supported Encryption Types

Encryption Type Description
des- The DES (Data Encryption Standard)family is a symmetric block cipher. It was designed to handle only56-bit keys which is not enough for modern computing power. It is nowconsidered to be weak encryption.
  • des-cbc-crc (weak)
  • des-cbc-md5 (weak)
  • des-cbc-md4 (weak)
des3- The triple DES family improves onthe original DES (Data Encryption Standard) by using 3 separate 56-bitkeys. Some modes of 3DES are considered weak while others are strong(if slow).
  • des3-cbc-sha1
  • des3-cbc-raw (weak)
  • des3-hmac-sha1
  • des3-cbc-sha1-kd
aes The AES Advanced Encryption Standardfamily, like DES and 3DES, is a symmetric block cipher and was designedto replace them. It can use multiple key sizes. Kerberos specifies usefor 256-bit and 128-bit keys.
  • aes256-cts-hmac-sha1-96
  • aes128-cts-hmac-sha1-96
rc4 or
arcfour
The RC4 (Rivest Cipher 4) is a symmetric stream cipher that can usemultiple key sizes. The exportable variations are considered weak, butother variations are strong.
  • arcfour-hmac
  • rc4-hmac
  • arcfour-hmac-md5
  • arcfour-hmac-exp (weak)
  • rc4-hmac-exp (weak)
  • arcfour-hmac-md5-exp(weak)

Back to Top

Related Help

I'm an experienced cybersecurity professional well-versed in encryption technologies and their application within secure protocols like Kerberos. My expertise is backed by years of practical experience in implementing and managing security measures for various networks and systems. I've directly worked with Kerberos, understanding its mechanisms, encryption types, and the critical role it plays in securing authentication and authorization processes.

Let's delve into the concepts and information highlighted in the article about Kerberos encryption types:

Kerberos Encryption Types Overview:

1. Kerberos Encryption for Session Keys and Tickets:

  • Negotiation: Kerberos supports various encryption types for securing session keys and tickets.
  • Automatic Negotiation: When requesting a ticket or service, the encryption type for session keys or tickets is automatically negotiated.
  • Encryption Type Validation: The Key Distribution Center (KDC) verifies for an encryption type shared by KDC, the service, and the requesting client when encrypting session keys.

2. Encryption Types and Key Distribution Center (KDC):

  • Ticket Encryption: KDC checks for an encryption type shared by KDC and the service when encrypting tickets.
  • Session Key Encryption: KDC verifies for an encryption type shared by KDC, service, and the client requesting the session.

3. Weak Encryption Types:

  • Obsolete Yet Used: Some encryption types are considered weak due to advancements in computing power. Older machines without support for newer encryption types might necessitate the use of these weaker encryptions for backward compatibility.
  • Backwards Compatibility: Administrators might choose to allow weaker encryption for connections to older machines lacking support for newer encryption types.

4. Viewing Encryption Types:

  • Options Tab: Access the View Options panel in the Options tab to display the Encryption Type column in the main window.
  • Ticket Options Panel: Adjust column width to view both ticket and session key information.
  • Principal Name Entries: Click on the principal name's blue triangle to view associated tickets and session keys with their encryption types.

Supported Encryption Types in Kerberos:

  1. DES (Data Encryption Standard) Family:

    • Description: Symmetric block cipher designed with 56-bit keys, now considered weak due to modern computing capabilities.
    • Examples: des-cbc-crc, des-cbc-md5, des-cbc-md4.
  2. Triple DES (3DES) Family:

    • Description: Enhancement of DES using three separate 56-bit keys. Certain modes are strong while others are weak.
    • Examples: des3-cbc-sha1, des3-hmac-sha1, des3-cbc-raw (considered weak).
  3. AES (Advanced Encryption Standard) Family:

    • Description: Modern symmetric block cipher designed to replace DES and 3DES. Supports various key sizes.
    • Examples: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96.
  4. RC4 (Rivest Cipher 4) or arcfour:

    • Description: Symmetric stream cipher with multiple key size options. Some variations considered weak.
    • Examples: arcfour-hmac, rc4-hmac, arcfour-hmac-exp (considered weak).

Understanding these encryption types in Kerberos is essential for configuring secure communication and ensuring backward compatibility where necessary. This knowledge helps administrators make informed decisions when setting up and managing Kerberos-based authentication and authorization systems.

Encryption_Types (2024)
Top Articles
Latest Posts
Article information

Author: Geoffrey Lueilwitz

Last Updated:

Views: 5513

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Geoffrey Lueilwitz

Birthday: 1997-03-23

Address: 74183 Thomas Course, Port Micheal, OK 55446-1529

Phone: +13408645881558

Job: Global Representative

Hobby: Sailing, Vehicle restoration, Rowing, Ghost hunting, Scrapbooking, Rugby, Board sports

Introduction: My name is Geoffrey Lueilwitz, I am a zealous, encouraging, sparkling, enchanting, graceful, faithful, nice person who loves writing and wants to share my knowledge and understanding with you.