Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2007.19guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos

Published: 20 May 2007 Publication History

Abstract

Kerberos is a widely-deployed network authentication protocol that is being considered for standardization. Many works have analyzed its security, identifying flaws and often suggesting fixes, thus helping the protocol's evolution. Several recent results present successful formal-methodsbased verification of a significant portion of the current version 5, and some even imply security in the computational setting. For these results to hold, encryption in Kerberos should satisfy strong cryptographic security notions. However, neither currently deployed as part of Kerberos encryption schemes nor their proposed revisions are known to provably satisfy such notions. We take a close look at Kerberos' encryption and confirm that most of the options in the current version provably provide privacy and authenticity, some with slight modification that we suggest. Our results complement the formal-methods-based analysis of Kerberos that justifies its current design.

Cited By

View all
  • (2017)A privacy-enhanced access log management mechanism in SSO systems from nominative signaturesInternational Journal of Applied Cryptography10.1504/IJACT.2017.0893733:4(394-406)Online publication date: 1-Jan-2017
  • (2012)Provable security of S-BGP and other path vector protocolsProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382254(541-552)Online publication date: 16-Oct-2012
  • (2009)Security Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsProceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology10.1007/978-3-642-02384-2_15(235-253)Online publication date: 19-Jun-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
May 2007
362 pages
ISBN:0769528481

Publisher

IEEE Computer Society

United States

Publication History

Published: 20 May 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A privacy-enhanced access log management mechanism in SSO systems from nominative signaturesInternational Journal of Applied Cryptography10.1504/IJACT.2017.0893733:4(394-406)Online publication date: 1-Jan-2017
  • (2012)Provable security of S-BGP and other path vector protocolsProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382254(541-552)Online publication date: 16-Oct-2012
  • (2009)Security Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsProceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology10.1007/978-3-642-02384-2_15(235-253)Online publication date: 19-Jun-2009
  • (2008)Stronger TLS bindings for SAML assertions and SAML artifactsProceedings of the 2008 ACM workshop on Secure web services10.1145/1456492.1456495(11-20)Online publication date: 31-Oct-2008
  • (2008)Computationally sound mechanized proofs for basic and public-key KerberosProceedings of the 2008 ACM symposium on Information, computer and communications security10.1145/1368310.1368326(87-99)Online publication date: 18-Mar-2008
  • (2008)Immunising CBC Mode Against Padding Oracle AttacksProceedings of the 6th international conference on Security and Cryptography for Networks10.1007/978-3-540-85855-3_23(340-357)Online publication date: 10-Sep-2008
  • (2007)Formal proofs of cryptographic security of Diffie-Hellman-based protocolsProceedings of the 3rd conference on Trustworthy global computing10.5555/1793574.1793597(312-329)Online publication date: 5-Nov-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media