Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos
- 1 May 2007
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10816011,p. 92-100
- https://doi.org/10.1109/sp.2007.19
Abstract
Kerberos is a widely-deployed network authentication protocol that is being considered for standardization. Many works have analyzed its security, identifying flaws and often suggesting fixes, thus helping the protocol's evolution. Several recent results present successful formal-methods-based verification of a significant portion of the current version 5, and some even imply security in the computational setting. For these results to hold, encryption in Kerberos should satisfy strong cryptographic security notions. However, neither currently deployed as part of Kerberos encryption schemes nor their proposed revisions are known to provably satisfy such notions. We take a close look at Kerberos' encryption and confirm that most of the options in the current version provably provide privacy and authenticity, some with slight modification that we suggest. Our results complement the formal-methods-based analysis of Kerberos that justifies its current design.Keywords
This publication has 13 references indexed in Scilit:
- Provable-security analysis of authenticated encryption in KerberosIET Information Security, 2011
- Formal analysis of Kerberos 5Theoretical Computer Science, 2006
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,2005
- Encryption and Checksum Specifications for Kerberos 5Published by RFC Editor ,2005
- Advanced Encryption Standard (AES) Encryption for Kerberos 5Published by RFC Editor ,2005
- Symmetric encryption in a simulatable Dolev-Yao style cryptographic libraryPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A composable cryptographic library with nested operationsPublished by Association for Computing Machinery (ACM) ,2003
- On message integrity in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Authenticated encryption in SSHPublished by Association for Computing Machinery (ACM) ,2002
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990