Abstract
Despite advances in network security, malicious attacks have shown a significant increase in recent times. Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, given sufficient time, well-equipped intruders succeed in breaking encryptions and compromising system security. The protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. Communicating Sequential Processes (CSP) is an abstract language designed especially for the description of communication patterns. A notion of rank functions is introduced for analysing purposes as well. This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results of the designed protocol are presented and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Softw. Eng. 22, 6–15 (1996)
Bellovin, S.M., Merritt, M.: Limitations of the Kerberos Protocol. In: Winter 1991 USENIX Conference Proceedings, pp. 253–267. USENIX Association (1991)
Eneh, A., Gemikonakli, O., Comley, R.: Security of Electronic Commerce Authentication Protocols. In: Economically Deprived Communities: The 5th Security Conference (2006)
Harbitter, A., Menascé, D.A.: A Methodology for Analyzing the Performance of Authentication Protocols. ACM Trans. Inf. Syst. Secur. 5, 458–491 (2002)
Hoare, C.A.: Communicating Sequential Processes. Prentice- Hall, Englewood Cliffs (1985)
Kirsal, Y., Eneh, A., Gemikonakli, O.: A Solution to the Problem of Trusted 3rd Party of IEEE 802.11b Networks. In: 6th Annual Postgraduate Symposium (PGNET 2005), pp. 333–339 (2005)
Kirsal, Y., Gemikonakli, O.: An Authentication Protocol to Address the Problem of the Trusted 3rd Party. In: Authentication Protocols Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, pp. 523–526. Springer, Netherlands (2006)
Kirsal, Y., Gemikonakli, O.: Frequent Key Renewal Under Pseudo-Secure Conditions For Increased Security in Kerberos Authentication and its Impact on System Performability. In: Proceedings of the 3rd International Conference on Global E-Security, University of East London, UeL (2007)
Kirsal, Y., Gemikonakli, O.: Further Improvements to the Kerberos Timed Authentication Protocol. In: Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 550–554. Springer, Netherlands (2007)
Kirsal, Y., Gemikonakli, O.: Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal. In: 7th IEEE International Conference on Cybernetic Intelligent Systems (CIS 2008), pp. 153–158. IEEE Press, Los Alamitos (2008)
Lowe, G.: An attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters 56(3), 131–133 (1995)
Lowe, G.: Some New Attacks upon Security Protocols. In: 9th IEEE Computer Security Workshops, pp. 162–169. Society Press (1996)
Lowe, G.: Casper: A Compiler for the Analysis of Security Protocols. In: 10th Computer Security Foundations Workshop (CSFW 1997), pp. 18–30. IEEE Computer Society, Los Alamitos (1997)
Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1x Standard, UMIACS-TR-2002-10 (2002)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21, 993–999 (1978)
Roscoe, A.W.: CSP and Determinism in Security Modelling. In: Proc. IEEE Symposium on Security and Privacy, pp. 114–127. Society Press (1995)
Schneider, S.: Verifying Authentication Protocols in CSP. IEEE Trans. Softw. Eng. 24, 741–758 (1998)
SECWP: Security White Paper Evolution, Requirements, and Options, Symbol Technologies Inc. (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kirsal, Y., Gemikonakli, O. (2009). Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds) Global Security, Safety, and Sustainability. ICGS3 2009. Communications in Computer and Information Science, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04062-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-04062-7_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04061-0
Online ISBN: 978-3-642-04062-7
eBook Packages: Computer ScienceComputer Science (R0)