A Formal Analysis of Some Properties of Kerberos 5 Using MSR

نویسندگان

  • Frederick Butler
  • Iliano Cervesato
  • Aaron D. Jaggard
  • Andre Scedrov
چکیده

We give three formalizations of the Kerberos 5 authentication protocol in the Multi-Set Rewriting (MSR)formalism. One is a high-level formalization containing just enough detail to prove authentication andconfidentiality properties of the protocol. A second formalization refines this by adding a variety of protocoloptions; we similarly refine proofs of properties in the first formalization to prove properties of the secondformalization. Our third formalization adds timestamps to the first formalization but has not been analyzedextensively. The various proofs make use of rank and corank functions, inspired by work of Schneider in CSP,and provide examples of reasoning about real-world protocols in MSR.We also note some potentially curiousprotocol behavior; given our positive results, this does not compromise the security of the protocol. CommentsUniversity of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-04-04 This technical report is available at ScholarlyCommons: http://repository.upenn.edu/cis_reports/892 A Formal Analysis of Some Properties of Kerberos 5 Using MSR ∗ University of Pennsylvania Department of Computer & Information Science Technical Report MS-CIS-04-04 Frederick Butler† Iliano Cervesato‡ Aaron D. Jaggard†¶ Andre Scedrov¶♦ Department of MathematicsUniversity of PennsylvaniaPhiladelphia, PA USA{fbutler@math,[email protected]}.upenn.eduITT Industries, Inc.Advanced Engineering & Sciences2560 Huntington AvenueAlexandria, VA [email protected] Department of MathematicsTulane UniversityNew Orleans, LA [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifying Confidentiality and Authentication in Kerberos 5

We present results from a recent project analyzing Kerberos 5. The main expected properties of this protocol, namely confidentiality and authentication, hold throughout the protocol. Our analysis also highlights a number of behaviors that do not follow the script of the protocol, although they do not appear harmful for the principals involved. We obtained these results by formalizing Kerberos 5...

متن کامل

Verifying Confidentiality and Authentication in Kerberos

We present results from a recent project analyzing Kerberos 5. The main expected properties of this protocol, namely confidentiality and authentication, hold throughout the protocol. Our analysis also highlights a number of behaviors that do not follow the script of the protocol, although they do not appear harmful for the principals involved. We obtained these results by formalizing Kerberos 5...

متن کامل

Formal analysis of Kerberos 5

We report on the detailed verification of a substantial portion of the Kerberos 5 protocol specification. Because it targeted a deployed protocol rather than an academic abstraction, this multi-year effort led to the development of new analysis methods in order to manage the inherent complexity. This enabled proving that Kerberos supports the expected authentication and confidentiality properti...

متن کامل

Provable-Security Analysis of Authenticated Encryption in Kerberos∗

Kerberos is a widely-deployed network authentication protocol that is being considered for standardization. Many works have analyzed its security, identifying flaws and often suggesting fixes, thus helping the protocol’s evolution. Several recent results present successful formalmethods-based verification of a significant portion of the current version 5, and some even imply security in the com...

متن کامل

Breaking and Fixing Public-Key Kerberos

We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002