Loading…

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal appro...

Full description

Saved in:
Bibliographic Details
Published in:KSII transactions on Internet and information systems 2014, 8(12), , pp.4604-4623
Main Authors: Kirsal-Ever, Yoney, Eneh, Agozie, Gemikonakli, Orhan, Mostarda, Leonardo
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 4623
container_issue 12
container_start_page 4604
container_title KSII transactions on Internet and information systems
container_volume 8
creator Kirsal-Ever, Yoney
Eneh, Agozie
Gemikonakli, Orhan
Mostarda, Leonardo
description Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols
doi_str_mv 10.3837/tiis.2014.12.021
format article
fullrecord <record><control><sourceid>gale_nrf_k</sourceid><recordid>TN_cdi_nrf_kci_oai_kci_go_kr_ARTI_424508</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A399109487</galeid><sourcerecordid>A399109487</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63</originalsourceid><addsrcrecordid>eNptkU1vEzEQhlcVSK1K7z1a4sIli8d21rvHVUSgohJVSM_WrD9Sk10b7I2q_HuchANIjA8znnneOcxbVfdAa95y-XH2PteMgqiB1ZTBVXUDnWwWkkn55q_6urrL-QctsaTQMLipch9wPGYfdmR-sWQVp8EHa8hXmwabYiZbP5VvfyjTMHuNs4-BPKU4Rx1HgsGQdbK_DmVYNEeyscG-4kiezytX35_OyAbDnqwPQZ_U-V311uGY7d2ffFs9rz9tV18Wj98-P6z6x4XmvJ0XTgjDqGncACCGwVonwFAxdCCWwIGCQWOsRGyN0wPXWA4gG0QtgQHqht9WHy57Q3Jqr72K6M95F9U-qX6zfVCCiSVtC_r-gu5wtMoHF-eEevJZq553HdBOtLJQ9X-o8oydvI7BOl_6_wjoRaDLKXOyTv1MfsJ0VEDVyTl1ck6dnFPAVHGO_wYcs4yG</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><source>EZB Electronic Journals Library</source><creator>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creator><creatorcontrib>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creatorcontrib><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><identifier>DOI: 10.3837/tiis.2014.12.021</identifier><language>eng</language><publisher>KSII, the Korean Society for Internet Information</publisher><subject>Analysis ; Authentication ; Computer network protocols ; Data encryption ; Engineering research ; Methods ; Safety and security measures ; 컴퓨터학</subject><ispartof>KSII Transactions on Internet and Information Systems, 2014, 8(12), , pp.4604-4623</ispartof><rights>COPYRIGHT 2014 KSII, the Korean Society for Internet Information</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids><backlink>$$Uhttps://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002058594$$DAccess content in National Research Foundation of Korea (NRF)$$Hfree_for_read</backlink></links><search><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><title>KSII transactions on Internet and information systems</title><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</description><subject>Analysis</subject><subject>Authentication</subject><subject>Computer network protocols</subject><subject>Data encryption</subject><subject>Engineering research</subject><subject>Methods</subject><subject>Safety and security measures</subject><subject>컴퓨터학</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNptkU1vEzEQhlcVSK1K7z1a4sIli8d21rvHVUSgohJVSM_WrD9Sk10b7I2q_HuchANIjA8znnneOcxbVfdAa95y-XH2PteMgqiB1ZTBVXUDnWwWkkn55q_6urrL-QctsaTQMLipch9wPGYfdmR-sWQVp8EHa8hXmwabYiZbP5VvfyjTMHuNs4-BPKU4Rx1HgsGQdbK_DmVYNEeyscG-4kiezytX35_OyAbDnqwPQZ_U-V311uGY7d2ffFs9rz9tV18Wj98-P6z6x4XmvJ0XTgjDqGncACCGwVonwFAxdCCWwIGCQWOsRGyN0wPXWA4gG0QtgQHqht9WHy57Q3Jqr72K6M95F9U-qX6zfVCCiSVtC_r-gu5wtMoHF-eEevJZq553HdBOtLJQ9X-o8oydvI7BOl_6_wjoRaDLKXOyTv1MfsJ0VEDVyTl1ck6dnFPAVHGO_wYcs4yG</recordid><startdate>20141231</startdate><enddate>20141231</enddate><creator>Kirsal-Ever, Yoney</creator><creator>Eneh, Agozie</creator><creator>Gemikonakli, Orhan</creator><creator>Mostarda, Leonardo</creator><general>KSII, the Korean Society for Internet Information</general><general>한국인터넷정보학회</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ACYCR</scope></search><sort><creationdate>20141231</creationdate><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><author>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Analysis</topic><topic>Authentication</topic><topic>Computer network protocols</topic><topic>Data encryption</topic><topic>Engineering research</topic><topic>Methods</topic><topic>Safety and security measures</topic><topic>컴퓨터학</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><collection>CrossRef</collection><collection>Korean Citation Index</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirsal-Ever, Yoney</au><au>Eneh, Agozie</au><au>Gemikonakli, Orhan</au><au>Mostarda, Leonardo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><date>2014-12-31</date><risdate>2014</risdate><volume>8</volume><issue>12</issue><spage>4604</spage><epage>4623</epage><pages>4604-4623</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</abstract><pub>KSII, the Korean Society for Internet Information</pub><doi>10.3837/tiis.2014.12.021</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII Transactions on Internet and Information Systems, 2014, 8(12), , pp.4604-4623
issn 1976-7277
1976-7277
language eng
recordid cdi_nrf_kci_oai_kci_go_kr_ARTI_424508
source EZB Electronic Journals Library
subjects Analysis
Authentication
Computer network protocols
Data encryption
Engineering research
Methods
Safety and security measures
컴퓨터학
title Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T14%3A01%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_nrf_k&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysing%20the%20Combined%20Kerberos%20Timed%20Authentication%20Protocol%20and%20Frequent%20Key%20Renewal%20Using%20CSP%20and%20Rank%20Functions&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Kirsal-Ever,%20Yoney&rft.date=2014-12-31&rft.volume=8&rft.issue=12&rft.spage=4604&rft.epage=4623&rft.pages=4604-4623&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/10.3837/tiis.2014.12.021&rft_dat=%3Cgale_nrf_k%3EA399109487%3C/gale_nrf_k%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=A399109487&rfr_iscdi=true