Skip to main content

Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions

  • Conference paper
Global Security, Safety, and Sustainability (ICGS3 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 45))

Abstract

Despite advances in network security, malicious attacks have shown a significant increase in recent times. Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, given sufficient time, well-equipped intruders succeed in breaking encryptions and compromising system security. The protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. Communicating Sequential Processes (CSP) is an abstract language designed especially for the description of communication patterns. A notion of rank functions is introduced for analysing purposes as well. This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results of the designed protocol are presented and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Softw. Eng. 22, 6–15 (1996)

    Article  Google Scholar 

  2. Bellovin, S.M., Merritt, M.: Limitations of the Kerberos Protocol. In: Winter 1991 USENIX Conference Proceedings, pp. 253–267. USENIX Association (1991)

    Google Scholar 

  3. Eneh, A., Gemikonakli, O., Comley, R.: Security of Electronic Commerce Authentication Protocols. In: Economically Deprived Communities: The 5th Security Conference (2006)

    Google Scholar 

  4. Harbitter, A., Menascé, D.A.: A Methodology for Analyzing the Performance of Authentication Protocols. ACM Trans. Inf. Syst. Secur. 5, 458–491 (2002)

    Article  Google Scholar 

  5. Hoare, C.A.: Communicating Sequential Processes. Prentice- Hall, Englewood Cliffs (1985)

    MATH  Google Scholar 

  6. Kirsal, Y., Eneh, A., Gemikonakli, O.: A Solution to the Problem of Trusted 3rd Party of IEEE 802.11b Networks. In: 6th Annual Postgraduate Symposium (PGNET 2005), pp. 333–339 (2005)

    Google Scholar 

  7. Kirsal, Y., Gemikonakli, O.: An Authentication Protocol to Address the Problem of the Trusted 3rd Party. In: Authentication Protocols Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, pp. 523–526. Springer, Netherlands (2006)

    Google Scholar 

  8. Kirsal, Y., Gemikonakli, O.: Frequent Key Renewal Under Pseudo-Secure Conditions For Increased Security in Kerberos Authentication and its Impact on System Performability. In: Proceedings of the 3rd International Conference on Global E-Security, University of East London, UeL (2007)

    Google Scholar 

  9. Kirsal, Y., Gemikonakli, O.: Further Improvements to the Kerberos Timed Authentication Protocol. In: Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 550–554. Springer, Netherlands (2007)

    Google Scholar 

  10. Kirsal, Y., Gemikonakli, O.: Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal. In: 7th IEEE International Conference on Cybernetic Intelligent Systems (CIS 2008), pp. 153–158. IEEE Press, Los Alamitos (2008)

    Google Scholar 

  11. Lowe, G.: An attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters 56(3), 131–133 (1995)

    Article  MATH  Google Scholar 

  12. Lowe, G.: Some New Attacks upon Security Protocols. In: 9th IEEE Computer Security Workshops, pp. 162–169. Society Press (1996)

    Google Scholar 

  13. Lowe, G.: Casper: A Compiler for the Analysis of Security Protocols. In: 10th Computer Security Foundations Workshop (CSFW 1997), pp. 18–30. IEEE Computer Society, Los Alamitos (1997)

    Chapter  Google Scholar 

  14. Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1x Standard, UMIACS-TR-2002-10 (2002)

    Google Scholar 

  15. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21, 993–999 (1978)

    Article  MATH  Google Scholar 

  16. Roscoe, A.W.: CSP and Determinism in Security Modelling. In: Proc. IEEE Symposium on Security and Privacy, pp. 114–127. Society Press (1995)

    Google Scholar 

  17. Schneider, S.: Verifying Authentication Protocols in CSP. IEEE Trans. Softw. Eng. 24, 741–758 (1998)

    Article  Google Scholar 

  18. SECWP: Security White Paper Evolution, Requirements, and Options, Symbol Technologies Inc. (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kirsal, Y., Gemikonakli, O. (2009). Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04062-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04061-0

  • Online ISBN: 978-3-642-04062-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics