On key distribution protocols for repeated authentication
- 1 October 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 27 (4) , 24-30
- https://doi.org/10.1145/163640.163642
Abstract
In [KSL92], Kehne et al. present a protocol (KSL) for key distribution. Their protocol allows for repeated authentication by means of a ticket. They also give a proof in BAN logic [BAN89] that the protocol provides the principals with a reasonable degree of trust in the authentication and key distribution. They present an optimality result that their protocol contains a minimal number of messages. Nonetheless, in [NS93] Neuman and Stubblebine present a protocol (NS) as an explicit alternative to KSL that requires one less message in the initial authentication and key distribution. One goal of this paper is to examine some of the reasons for this discrepancy. Another goal is to demonstrate possible attacks on NS. Like any attacks on cryptographic protocols, these depend on assumptions about implementation details. But, when possible they are serious: a penetrator can initiate the protocol, masquerade as another principal, obtain the session key, and even generate the session key herself. 1 We will set out implementation assumptions required for the attacks to take place and implementation assumptions that preclude such an attack. We will also look at other protocols, including one that is not subject to this form of attack and has the same number of messages as NS. Finally, we will briefly discuss the logical analysis of these repeat authentication protocols.Keywords
This publication has 14 references indexed in Scilit:
- Using logics to detect implementation-dependent flaws [cryptographic protocol design]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Logics for cryptographic protocols-virtues and limitationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- A critique of the Burrows, Abadi and Needham logicACM SIGOPS Operating Systems Review, 1990
- Rejoinder to NessettACM SIGOPS Operating Systems Review, 1990
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978