Title
A Parameterized Analysis Of Public-Key Protocols: Needham-Schroeder And Kerberos-5
Abstract
The need for providing assurance in parameter matching in authentication protocols is emphasized by analyzing well-known Needham-Schroeder public-key protocol as well as the public-key extension of widely deployed network authentication protocol Kerberos-5. Authentication protocols achieve their goals when a participant guarantees its set of parameters to be in accordance with that of the rest of the participants of the protocol. On the other hand, the lack of guarantee suggests possible venues for attacks by a saboteur. The above mentioned protocols exhibit this lack of assurance in parameter matching among participants and hence are succumbed to subtle attacks presented in this paper. We further elaborate the commonalities in the vulnerability of both the protocols. © 2006 IEEE.
Publication Date
12-1-2006
Publication Title
Proceedings - 2006 IEEE International Conference on Networks, ICON 2006 - Networking-Challenges and Frontiers
Volume
2
Number of Pages
294-299
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICON.2006.302643
Copyright Status
Unknown
Socpus ID
46449087394 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/46449087394
STARS Citation
Muhammad, Shahabuddin; Furqan, Zeeshan; and Guha, Ratan K., "A Parameterized Analysis Of Public-Key Protocols: Needham-Schroeder And Kerberos-5" (2006). Scopus Export 2000s. 7640.
https://stars.library.ucf.edu/scopus2000/7640