Loading…

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal appro...

Full description

Saved in:
Bibliographic Details
Published in:KSII transactions on Internet and information systems 2014-12, Vol.8 (12), p.4604-4623
Main Authors: Kirsal-Ever, Yoney, Eneh, Agozie, Gemikonakli, Orhan, Mostarda, Leonardo
Format: Article
Language:Korean
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 4623
container_issue 12
container_start_page 4604
container_title KSII transactions on Internet and information systems
container_volume 8
creator Kirsal-Ever, Yoney
Eneh, Agozie
Gemikonakli, Orhan
Mostarda, Leonardo
description Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.
format article
fullrecord <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201403760397492</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3534216</kiss_id><sourcerecordid>3534216</sourcerecordid><originalsourceid>FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23</originalsourceid><addsrcrecordid>eNpNjE1PhDAYhInRxM26v8BLLx5J-kVLj4SIH7vJblY8kxZetAGKUojh38uuxniamcwzcxGsiJIilFTKy3_-Oth4bw0mNKaCx_Eq8InT7eyte0PjO6C074x1UKEtDAaG3qPcdktMpqV1oy31aHuHDkM_9mXfIu0qlA3wOS3lspnRERx86Ra9ni_Tl8MZOWrXoGxy5Wntb4KrWrceNr-6DvLsPk8fw93-4SlNdmETYRoSUwsV8yoyleRC1ZwzIjSnscYga1UqEWFGy5hQDUTUBCKusVFgQNWSGsrWwd3PbWP9aAtX-bZ4TrZ7ignHTArMlOTqxN3-cb74GGynh7lgEeOUCPYN9h5gkg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><source>EZB Electronic Journals Library</source><creator>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creator><creatorcontrib>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creatorcontrib><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>CASPER ; CSP ; Kerberos ; Key Renewal ; Key-Exchange Protocol ; Network Security ; Rank Functions ; Timed Authentication Protocols</subject><ispartof>KSII transactions on Internet and information systems, 2014-12, Vol.8 (12), p.4604-4623</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</description><subject>CASPER</subject><subject>CSP</subject><subject>Kerberos</subject><subject>Key Renewal</subject><subject>Key-Exchange Protocol</subject><subject>Network Security</subject><subject>Rank Functions</subject><subject>Timed Authentication Protocols</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpNjE1PhDAYhInRxM26v8BLLx5J-kVLj4SIH7vJblY8kxZetAGKUojh38uuxniamcwzcxGsiJIilFTKy3_-Oth4bw0mNKaCx_Eq8InT7eyte0PjO6C074x1UKEtDAaG3qPcdktMpqV1oy31aHuHDkM_9mXfIu0qlA3wOS3lspnRERx86Ra9ni_Tl8MZOWrXoGxy5Wntb4KrWrceNr-6DvLsPk8fw93-4SlNdmETYRoSUwsV8yoyleRC1ZwzIjSnscYga1UqEWFGy5hQDUTUBCKusVFgQNWSGsrWwd3PbWP9aAtX-bZ4TrZ7ignHTArMlOTqxN3-cb74GGynh7lgEeOUCPYN9h5gkg</recordid><startdate>20141231</startdate><enddate>20141231</enddate><creator>Kirsal-Ever, Yoney</creator><creator>Eneh, Agozie</creator><creator>Gemikonakli, Orhan</creator><creator>Mostarda, Leonardo</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20141231</creationdate><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><author>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2014</creationdate><topic>CASPER</topic><topic>CSP</topic><topic>Kerberos</topic><topic>Key Renewal</topic><topic>Key-Exchange Protocol</topic><topic>Network Security</topic><topic>Rank Functions</topic><topic>Timed Authentication Protocols</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><collection>KISS</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirsal-Ever, Yoney</au><au>Eneh, Agozie</au><au>Gemikonakli, Orhan</au><au>Mostarda, Leonardo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2014-12-31</date><risdate>2014</risdate><volume>8</volume><issue>12</issue><spage>4604</spage><epage>4623</epage><pages>4604-4623</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed.</abstract><pub>한국인터넷정보학회</pub><tpages>20</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2014-12, Vol.8 (12), p.4604-4623
issn 1976-7277
1976-7277
language kor
recordid cdi_kisti_ndsl_JAKO201403760397492
source EZB Electronic Journals Library
subjects CASPER
CSP
Kerberos
Key Renewal
Key-Exchange Protocol
Network Security
Rank Functions
Timed Authentication Protocols
title Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T13%3A34%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysing%20the%20Combined%20Kerberos%20Timed%20Authentication%20Protocol%20and%20Frequent%20Key%20Renewal%20Using%20CSP%20and%20Rank%20Functions&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Kirsal-Ever,%20Yoney&rft.date=2014-12-31&rft.volume=8&rft.issue=12&rft.spage=4604&rft.epage=4623&rft.pages=4604-4623&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3534216%3C/kiss_kisti%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-k502-1bf6984d5bd7469f44316a428a0e7f9c965032c812ae16f1e54a0b9ebe9f72b23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3534216&rfr_iscdi=true