Cryptographically sound security proofs for basic and public-key Kerberos

被引:0
|
作者
Backes, M. [1 ]
Cervesato, I.
Jaggard, A. D.
Scedrov, A.
Tsay, J. -K.
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] Tulane Univ, New Orleans, LA 70118 USA
[3] Univ Penn, Philadelphia, PA 19104 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a computational analysis of basic Kerberos and Kerberos with public-key authentication (PKINIT) in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev-Yao style model of Backes, Pfitzmann and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This is the most complex fragment of an industrial protocol that has yet been verified at the computational level. Considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev-Yao model to cryptographically sound results in the computational model.
引用
收藏
页码:362 / 383
页数:22
相关论文
共 50 条
  • [1] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, Michael
    Cervesato, Iliano
    Jaggard, Aaron D.
    Scedrov, Andre
    Tsay, Joe-Kai
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 107 - 134
  • [2] Cryptographically sound security proofs for basic and public-key Kerberos
    Michael Backes
    Iliano Cervesato
    Aaron D. Jaggard
    Andre Scedrov
    Joe-Kai Tsay
    International Journal of Information Security, 2011, 10
  • [3] A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
    Backes, M
    Pfitzmann, B
    FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 1 - 12
  • [4] A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
    Backes, M
    Pfitzmann, B
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (10) : 2075 - 2086
  • [5] Breaking and fixing public-key Kerberos
    Cervesato, Iliano
    Jaggard, Aaron D.
    Scedrov, Andre
    Tsay, Joe-Kai
    Walstad, Christopher
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 402 - 424
  • [6] Breaking and fixing public-key Kerberos
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    Walstad, C.
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
  • [7] Public-key encryption in a multi-user setting: Security proofs and improvements
    Bellare, M
    Boldyreva, A
    Micali, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 259 - 274
  • [8] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [9] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [10] Public-key security systems
    Univ of New Orleans, New Orleans, United States
    IEEE Micro, 3 (10-13):