Title

A Parameterized Analysis Of Public-Key Protocols: Needham-Schroeder And Kerberos-5

Abstract

The need for providing assurance in parameter matching in authentication protocols is emphasized by analyzing well-known Needham-Schroeder public-key protocol as well as the public-key extension of widely deployed network authentication protocol Kerberos-5. Authentication protocols achieve their goals when a participant guarantees its set of parameters to be in accordance with that of the rest of the participants of the protocol. On the other hand, the lack of guarantee suggests possible venues for attacks by a saboteur. The above mentioned protocols exhibit this lack of assurance in parameter matching among participants and hence are succumbed to subtle attacks presented in this paper. We further elaborate the commonalities in the vulnerability of both the protocols. © 2006 IEEE.

Publication Date

12-1-2006

Publication Title

Proceedings - 2006 IEEE International Conference on Networks, ICON 2006 - Networking-Challenges and Frontiers

Volume

2

Number of Pages

294-299

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/ICON.2006.302643

Socpus ID

46449087394 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/46449087394

This document is currently not available here.

Share

COinS