Loading…
Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions
Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal appro...
Saved in:
Published in: | KSII transactions on Internet and information systems 2014, 8(12), , pp.4604-4623 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 4623 |
container_issue | 12 |
container_start_page | 4604 |
container_title | KSII transactions on Internet and information systems |
container_volume | 8 |
creator | Kirsal-Ever, Yoney Eneh, Agozie Gemikonakli, Orhan Mostarda, Leonardo |
description | Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols |
doi_str_mv | 10.3837/tiis.2014.12.021 |
format | article |
fullrecord | <record><control><sourceid>gale_nrf_k</sourceid><recordid>TN_cdi_nrf_kci_oai_kci_go_kr_ARTI_424508</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A399109487</galeid><sourcerecordid>A399109487</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63</originalsourceid><addsrcrecordid>eNptkU1vEzEQhlcVSK1K7z1a4sIli8d21rvHVUSgohJVSM_WrD9Sk10b7I2q_HuchANIjA8znnneOcxbVfdAa95y-XH2PteMgqiB1ZTBVXUDnWwWkkn55q_6urrL-QctsaTQMLipch9wPGYfdmR-sWQVp8EHa8hXmwabYiZbP5VvfyjTMHuNs4-BPKU4Rx1HgsGQdbK_DmVYNEeyscG-4kiezytX35_OyAbDnqwPQZ_U-V311uGY7d2ffFs9rz9tV18Wj98-P6z6x4XmvJ0XTgjDqGncACCGwVonwFAxdCCWwIGCQWOsRGyN0wPXWA4gG0QtgQHqht9WHy57Q3Jqr72K6M95F9U-qX6zfVCCiSVtC_r-gu5wtMoHF-eEevJZq553HdBOtLJQ9X-o8oydvI7BOl_6_wjoRaDLKXOyTv1MfsJ0VEDVyTl1ck6dnFPAVHGO_wYcs4yG</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><source>EZB Electronic Journals Library</source><creator>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creator><creatorcontrib>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</creatorcontrib><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><identifier>DOI: 10.3837/tiis.2014.12.021</identifier><language>eng</language><publisher>KSII, the Korean Society for Internet Information</publisher><subject>Analysis ; Authentication ; Computer network protocols ; Data encryption ; Engineering research ; Methods ; Safety and security measures ; 컴퓨터학</subject><ispartof>KSII Transactions on Internet and Information Systems, 2014, 8(12), , pp.4604-4623</ispartof><rights>COPYRIGHT 2014 KSII, the Korean Society for Internet Information</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids><backlink>$$Uhttps://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002058594$$DAccess content in National Research Foundation of Korea (NRF)$$Hfree_for_read</backlink></links><search><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><title>KSII transactions on Internet and information systems</title><description>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</description><subject>Analysis</subject><subject>Authentication</subject><subject>Computer network protocols</subject><subject>Data encryption</subject><subject>Engineering research</subject><subject>Methods</subject><subject>Safety and security measures</subject><subject>컴퓨터학</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNptkU1vEzEQhlcVSK1K7z1a4sIli8d21rvHVUSgohJVSM_WrD9Sk10b7I2q_HuchANIjA8znnneOcxbVfdAa95y-XH2PteMgqiB1ZTBVXUDnWwWkkn55q_6urrL-QctsaTQMLipch9wPGYfdmR-sWQVp8EHa8hXmwabYiZbP5VvfyjTMHuNs4-BPKU4Rx1HgsGQdbK_DmVYNEeyscG-4kiezytX35_OyAbDnqwPQZ_U-V311uGY7d2ffFs9rz9tV18Wj98-P6z6x4XmvJ0XTgjDqGncACCGwVonwFAxdCCWwIGCQWOsRGyN0wPXWA4gG0QtgQHqht9WHy57Q3Jqr72K6M95F9U-qX6zfVCCiSVtC_r-gu5wtMoHF-eEevJZq553HdBOtLJQ9X-o8oydvI7BOl_6_wjoRaDLKXOyTv1MfsJ0VEDVyTl1ck6dnFPAVHGO_wYcs4yG</recordid><startdate>20141231</startdate><enddate>20141231</enddate><creator>Kirsal-Ever, Yoney</creator><creator>Eneh, Agozie</creator><creator>Gemikonakli, Orhan</creator><creator>Mostarda, Leonardo</creator><general>KSII, the Korean Society for Internet Information</general><general>한국인터넷정보학회</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ACYCR</scope></search><sort><creationdate>20141231</creationdate><title>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</title><author>Kirsal-Ever, Yoney ; Eneh, Agozie ; Gemikonakli, Orhan ; Mostarda, Leonardo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Analysis</topic><topic>Authentication</topic><topic>Computer network protocols</topic><topic>Data encryption</topic><topic>Engineering research</topic><topic>Methods</topic><topic>Safety and security measures</topic><topic>컴퓨터학</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kirsal-Ever, Yoney</creatorcontrib><creatorcontrib>Eneh, Agozie</creatorcontrib><creatorcontrib>Gemikonakli, Orhan</creatorcontrib><creatorcontrib>Mostarda, Leonardo</creatorcontrib><collection>CrossRef</collection><collection>Korean Citation Index</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirsal-Ever, Yoney</au><au>Eneh, Agozie</au><au>Gemikonakli, Orhan</au><au>Mostarda, Leonardo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><date>2014-12-31</date><risdate>2014</risdate><volume>8</volume><issue>12</issue><spage>4604</spage><epage>4623</epage><pages>4604-4623</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. In this study, Communicating Sequential Processes (CSP) which is an abstract language designed especially for the description of communication patterns is employed. Rank functions are also used for verification and analysis which are helpful to establish that some critical information is not available to the intruder. In order to establish this, by assigning a value or rank to each critical information, it is shown that all the critical information that can be generated within the network have a particular characterizing property. This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results are presented and discussed. Keywords: CASPER, CSP, Kerberos, Key-Exchange Protocol, Key Renewal, Network Security, Rank Functions, Timed Authentication Protocols</abstract><pub>KSII, the Korean Society for Internet Information</pub><doi>10.3837/tiis.2014.12.021</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1976-7277 |
ispartof | KSII Transactions on Internet and Information Systems, 2014, 8(12), , pp.4604-4623 |
issn | 1976-7277 1976-7277 |
language | eng |
recordid | cdi_nrf_kci_oai_kci_go_kr_ARTI_424508 |
source | EZB Electronic Journals Library |
subjects | Analysis Authentication Computer network protocols Data encryption Engineering research Methods Safety and security measures 컴퓨터학 |
title | Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T14%3A01%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_nrf_k&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysing%20the%20Combined%20Kerberos%20Timed%20Authentication%20Protocol%20and%20Frequent%20Key%20Renewal%20Using%20CSP%20and%20Rank%20Functions&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Kirsal-Ever,%20Yoney&rft.date=2014-12-31&rft.volume=8&rft.issue=12&rft.spage=4604&rft.epage=4623&rft.pages=4604-4623&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/10.3837/tiis.2014.12.021&rft_dat=%3Cgale_nrf_k%3EA399109487%3C/gale_nrf_k%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c338t-f44d20d6fb114bbeef41d04b914513101dadde7aa8dfcb3ca20176aac7121ac63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=A399109487&rfr_iscdi=true |