Title :
A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5
Author :
Muhammad, Shahabuddin ; Furqan, Zeeshan ; Guha, Ratan K.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Central Florida Univ., Orlando, FL
Abstract :
The need for providing assurance in parameter matching in authentication protocols is emphasized by analyzing well-known Needham-Schroeder public-key protocol as well as the public-key extension of widely deployed network authentication protocol Kerberos-5. Authentication protocols achieve their goals when a participant guarantees its set of parameters to be in accordance with that of the rest of the participants of the protocol. On the other hand, the lack of guarantee suggests possible venues for attacks by a saboteur. The above mentioned protocols exhibit this lack of assurance in parameter matching among participants and hence are succumbed to subtle attacks presented in this paper. We further elaborate the commonalities in the vulnerability of both the protocols.
Keywords :
cryptographic protocols; message authentication; public key cryptography; Kerberos-5 protocols; Needham-Schroeder public-key protocol; authentication protocols; parameter matching; Authentication; Computer network reliability; Computer science; Computer security; Cryptographic protocols; Cryptography; Data security; Logic; Memory; Public key;
Conference_Titel :
Networks, 2006. ICON '06. 14th IEEE International Conference on
Conference_Location :
Singapore
Print_ISBN :
0-7803-9746-0
DOI :
10.1109/ICON.2006.302643