期刊文献+

公钥Kerberos协议的认证服务过程的建模与验证 被引量:1

Modeling and Verifying the Authentication Service Exchange of the Public-Key Kerberos Protocol
下载PDF
导出
摘要 公钥Kerberos协议是目前广泛使用的一类认证协议。本文使用安全协议验证工具SPVT对公钥Kerberos协议(PKINIT)的认证服务过程进行了形式化的建模与验证。SPVT自动地检测出PKINIT存在一个中间人攻击,该攻击可使攻击者假冒密钥发布中心和终端服务器,骗取用户信任,窃取重要数据。本文首次使用验证工具检测出公钥Kerberos协议的攻击,该攻击的自动检测对大型复杂协议的自动验证具有重大意义。借助于SPVT,人们能尽早发现协议缺陷。这充分说明,SPVT能够对大型复杂安全协议进行建模与验证,是一个有效的协议验证工具。 Public-Key Kerberos is a widely deployed protocol. This paper models and verifies the authentication service exchange of Public-Key Kerberos(PKINIT) by SPVT which finds a man-in-the-middle attack. This flaw allows an attacker to impersonate the key distribution center and end-servers to deceive the clients and steal key data. It is the first time to check this attack automatically by the security protocol verification tool. The result is important in the verification of sophisticated protocoIs. With the help of SPVT, the flaws can be found as soon as possible. It also argues that SPVT is an effective verification tool in modeling and verifying sophisticated protocols.
出处 《计算机工程与科学》 CSCD 2008年第11期9-12,18,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60473057,90604007,60703075,90718017) 高等学校博士学科专项科研基金资助项目(20070006055)
关键词 公钥Kerberos协议 SPVT形式化建模 验证 Public-Key kerberos protocol SPVT formal modeling verification
  • 相关文献

参考文献22

  • 1Clark J A, Jacob J L. A Survey of Authentication Protocol Literature[R]. Technical Report 1.0,1997. 被引量:1
  • 2Lowe G. Casper: A Compiler for the Analysis of Security Protocols[C]//Proc of CSFW-10,1997:18- 30. 被引量:1
  • 3冯登国.国内外安全协议研究现状及发展趋势[C]∥安全协议研讨会文集,2004. 被引量:2
  • 4薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 5Backes M, Pfitzmann B, Waidner, M. Formal Methods and Cryptography[C]//Proc of FM'06,2006 : 612-616. 被引量:1
  • 6IETF. Public Key Cryptography for Initial Authentication in Kerberos[EB/OL]. [2007-10-15]. http://tools. ietf. org/ wg/krb-wg/draft-ietf-cat-kerberos-pk-init/. 被引量:1
  • 7Cervesato I,Jaggard A D, Tsay J K,et al. Breaking and Fixing Public-Key Kerberos[C]//Proc of ASIAN'06,2006: 64-178. 被引量:1
  • 8Microsoft Security Bulletin MS05-042 [EB/OL]. [2007-11- 12]. http://www. microsoft. com/technet/security/bulletin/ MS05-042. mspx. 被引量:1
  • 9Bella G. Inductive Verification of Cryptographic Protocols [D][Ph D Thesis]. London:University of Cambridge, 2000. 被引量:1
  • 10Butler F, Cervesato I, Jaggard A D, et al. Verifying Confidentiality and Authentication in Kerberos 5 [C]//Proc of ISSS'03,2003 : 1-24. 被引量:1

二级参考文献35

共引文献79

同被引文献14

  • 1Chuan-fu Z, Jiang Y, Wan-zhong S, et al. Internet Key Exchange Protocol Simulation of HAIPE in Securi- ty Network[C]//International Conference on Cyber- Enabled Distributed Computing and Knowledge Discov- ery. IEEE,2010:250-253. 被引量:1
  • 2Rao M C. A Fixed Network Transmission Based on Kerberos Authentication Protocol [J]. International Journal of Engineering, 2013,2(11). 被引量:1
  • 3Mundra P, Shukla S, Sharma M, et al. Modeling and Verification of Kerberos Protocol using Symbolic Model Verifier[C]//International Conference on Communica- tion Systems and Network Technologies. IEEE, 2011: 651-654. 被引量:1
  • 4Abdelmajid N T, Hossain M A, Shepherd S, et al. Location-Based Kerberos Authentication Protocol[C]// IEEE Second International Conference on Social Com- puting. IEEE,2010:1099-1104. 被引量:1
  • 5Abdelmajid N T, Hossain M A, Shepherd S, et at. Improved Kerberos security protocol evaluation using modified BAN logic [C]//IEEE 10th International Conference on Computer and Information Technology. IEEE,2010:1610-1615. 被引量:1
  • 6Butler F, Cervesato I, Jaggard A D, et al. Formal a- nalysis of Kerberos 5[J]. Theoretical Computer Sci- ence,2006,367(1) :57-87. 被引量:1
  • 7Mathuria A M, Safavi-Naini R, Nickolas P R. On the automation of GNY logic[J]. Australian Computer Science Communications, 1995,17:370-379. 被引量:1
  • 8Cohen M, Dam M. A completeness result for BAN logic[J]. Prococeedings of Methods for Modalities, 2005,4. 被引量:1
  • 9吴昌,肖美华.基于SPIN的IKEv2协议高效模型检测[J].计算机工程与应用,2008,44(5):158-161. 被引量:5
  • 10王威,胡铭曾,张兆心.基于串空间理论的Kerberos协议安全性分析[J].高技术通讯,2008,18(9):909-914. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部