DocumentCode :
3414572
Title :
A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5
Author :
Muhammad, Shahabuddin ; Furqan, Zeeshan ; Guha, Ratan K.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Central Florida Univ., Orlando, FL
Volume :
2
fYear :
2006
fDate :
Sept. 2006
Firstpage :
1
Lastpage :
6
Abstract :
The need for providing assurance in parameter matching in authentication protocols is emphasized by analyzing well-known Needham-Schroeder public-key protocol as well as the public-key extension of widely deployed network authentication protocol Kerberos-5. Authentication protocols achieve their goals when a participant guarantees its set of parameters to be in accordance with that of the rest of the participants of the protocol. On the other hand, the lack of guarantee suggests possible venues for attacks by a saboteur. The above mentioned protocols exhibit this lack of assurance in parameter matching among participants and hence are succumbed to subtle attacks presented in this paper. We further elaborate the commonalities in the vulnerability of both the protocols.
Keywords :
cryptographic protocols; message authentication; public key cryptography; Kerberos-5 protocols; Needham-Schroeder public-key protocol; authentication protocols; parameter matching; Authentication; Computer network reliability; Computer science; Computer security; Cryptographic protocols; Cryptography; Data security; Logic; Memory; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks, 2006. ICON '06. 14th IEEE International Conference on
Conference_Location :
Singapore
ISSN :
1556-6463
Print_ISBN :
0-7803-9746-0
Type :
conf
DOI :
10.1109/ICON.2006.302643
Filename :
4087714
Link To Document :
بازگشت