Loading…
Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions
Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal appro...
Saved in:
Published in: | KSII transactions on Internet and information systems 2014-12, Vol.8 (12), p.4604-4623 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | Korean |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 4623 |
container_issue | 12 |
container_start_page | 4604 |
container_title | KSII transactions on Internet and information systems |
container_volume | 8 |
creator | Kirsal-Ever, Yoney Eneh, Agozie Gemikonakli, Orhan Mostarda, Leonardo |
description | Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. |
format | article |
fullrecord | <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201403760397492</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3534216</kiss_id><sourcerecordid>3534216</sourcerecordid><originalsourceid>FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23</originalsourceid><addsrcrecordid>eNpNjE1PhDAYhInRxM26v8BLLx5J-kVLj4SIH7vJblY8kxZetAGKUojh38uuxniamcwzcxGsiJIilFTKy3_-Oth4bw0mNKaCx_Eq8InT7eyte0PjO6C074x1UKEtDAaG3qPcdktMpqV1oy31aHuHDkM_9mXfIu0qlA3wOS3lspnRERx86Ra9ni_Tl8MZOWrXoGxy5Wntb4KrWrceNr-6DvLsPk8fw93-4SlNdmETYRoSUwsV8yoyleRC1ZwzIjSnscYga1UqEWFGy5hQDUTUBCKusVFgQNWSGsrWwd3PbWP9aAtX-bZ4TrZ7ignHTArMlOTqxN3-cb74GGynh7lgEeOUCPYN9h5gkg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><source>EZB Electronic Journals Library</source><creator>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creator><creatorcontrib>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creatorcontrib><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>CASPER ; CSP ; Kerberos ; Key Renewal ; Key-Exchange Protocol ; Network Security ; Rank Functions ; Timed Authentication Protocols</subject><ispartof>KSII transactions on Internet and information systems, 2014-12, Vol.8 (12), p.4604-4623</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</description><subject>CASPER</subject><subject>CSP</subject><subject>Kerberos</subject><subject>Key Renewal</subject><subject>Key-Exchange Protocol</subject><subject>Network Security</subject><subject>Rank Functions</subject><subject>Timed Authentication Protocols</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpNjE1PhDAYhInRxM26v8BLLx5J-kVLj4SIH7vJblY8kxZetAGKUojh38uuxniamcwzcxGsiJIilFTKy3_-Oth4bw0mNKaCx_Eq8InT7eyte0PjO6C074x1UKEtDAaG3qPcdktMpqV1oy31aHuHDkM_9mXfIu0qlA3wOS3lspnRERx86Ra9ni_Tl8MZOWrXoGxy5Wntb4KrWrceNr-6DvLsPk8fw93-4SlNdmETYRoSUwsV8yoyleRC1ZwzIjSnscYga1UqEWFGy5hQDUTUBCKusVFgQNWSGsrWwd3PbWP9aAtX-bZ4TrZ7ignHTArMlOTqxN3-cb74GGynh7lgEeOUCPYN9h5gkg</recordid><startdate>20141231</startdate><enddate>20141231</enddate><creator>Kirsal-Ever, Yoney</creator><creator>Eneh, Agozie</creator><creator>Gemikonakli, Orhan</creator><creator>Mostarda, Leonardo</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20141231</creationdate><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><author>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2014</creationdate><topic>CASPER</topic><topic>CSP</topic><topic>Kerberos</topic><topic>Key Renewal</topic><topic>Key-Exchange Protocol</topic><topic>Network Security</topic><topic>Rank Functions</topic><topic>Timed Authentication Protocols</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><collection>KISS</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirsal-Ever, Yoney</au><au>Eneh, Agozie</au><au>Gemikonakli, Orhan</au><au>Mostarda, Leonardo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2014-12-31</date><risdate>2014</risdate><volume>8</volume><issue>12</issue><spage>4604</spage><epage>4623</epage><pages>4604-4623</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</abstract><pub>한국인터넷정보학회</pub><tpages>20</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1976-7277 |
ispartof | KSII transactions on Internet and information systems, 2014-12, Vol.8 (12), p.4604-4623 |
issn | 1976-7277 1976-7277 |
language | kor |
recordid | cdi_kisti_ndsl_JAKO201403760397492 |
source | EZB Electronic Journals Library |
subjects | CASPER CSP Kerberos Key Renewal Key-Exchange Protocol Network Security Rank Functions Timed Authentication Protocols |
title | Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T13%3A34%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysing%20the%20Combined%20Kerberos%20Timed%20Authentication%20Protocol%20and%20Frequent%20Key%20Renewal%20Using%20CSP%20and%20Rank%20Functions&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Kirsal-Ever,%20Yoney&rft.date=2014-12-31&rft.volume=8&rft.issue=12&rft.spage=4604&rft.epage=4623&rft.pages=4604-4623&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3534216%3C/kiss_kisti%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3534216&rfr_iscdi=true |