Breaking and fixing public-key Kerberos

被引:33
|
作者
Cervesato, Iliano [2 ]
Jaggard, Aaron D. [3 ]
Scedrov, Andre [1 ]
Tsay, Joe-Kai [1 ]
Walstad, Christopher [4 ]
机构
[1] Univ Penn, Dept Math, Philadelphia, PA 19104 USA
[2] Carnegie Mellon Univ Qatar, Doha, Qatar
[3] Rutgers State Univ, DIMACS, Piscataway, NJ 08854 USA
[4] Univ Penn, Sch Engn & Appl Sci, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
computer security; authentication protocols; Kerberos; PKINIT; man-in-the-middle attack; protocol verification;
D O I
10.1016/j.ic.2007.05.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF to change the specification of PKINIT and Microsoft to release a security update for some Windows operating systems. We discovered this attack as part of an ongoing formal analysis of the Kerberos protocol suite, and we have formally verified several possible fixes to PKINIT - including the one adopted by the IETF - that prevent our attack as well as other authentication and secrecy properties of Kerberos with PKINIT. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:402 / 424
页数:23
相关论文
共 50 条
  • [1] Breaking and fixing public-key Kerberos
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    Walstad, C.
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
  • [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    Lowe, G
    SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
  • [3] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, Michael
    Cervesato, Iliano
    Jaggard, Aaron D.
    Scedrov, Andre
    Tsay, Joe-Kai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 107 - 134
  • [4] Cryptographically sound security proofs for basic and public-key Kerberos
    Michael Backes
    Iliano Cervesato
    Aaron D. Jaggard
    Andre Scedrov
    Joe-Kai Tsay
    International Journal of Information Security, 2011, 10
  • [5] An improved way on Kerberos protocol based on public-key algorithms
    Liu, K.
    Qing, S.
    Meng, Y.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (06): : 872 - 877
  • [6] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, M.
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 362 - 383
  • [7] Breaking and repairing asymmetric public-key traitor tracing
    Kiayias, A
    Yung, M
    DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 32 - 50
  • [8] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    李大兴
    张泽增
    ChineseScienceBulletin, 1991, (10) : 873 - 876
  • [9] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    LI, DX
    ZHANG, ZZ
    CHINESE SCIENCE BULLETIN, 1991, 36 (10): : 873 - 876
  • [10] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +