Breaking and fixing public-key Kerberos
DOI10.1016/J.IC.2007.05.005zbMATH Open1147.68393OpenAlexW2166933234MaRDI QIDQ2482453FDOQ2482453
Authors: Iliano Cervesato, Aaron D. Jaggard, Joe-Kai Tsay, Christopher Walstad, Andre Scedrov
Publication date: 16 April 2008
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2007.05.005
Recommendations
- Cryptographically sound security proofs for basic and public-key Kerberos
- Formal analysis of Kerberos 5
- On strengthening authentication protocols to foil cryptanalysis
- scientific article; zbMATH DE number 1543079
- A reduction-based proof for authentication and session key security in three-party Kerberos
man-in-the-middle attackauthentication protocolscomputer securityprotocol verificationKerberosPKINIT
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10) Network protocols (68M12)
Cites Work
- Computer Aided Verification
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- On the security of recent protocols
- On the security of SPLICE/AS -- The authentication system in WIDE Internet
- Using encryption for authentication in large networks of computers
- On the security of public key protocols
- Searching for Shapes in Cryptographic Protocols
- Analyzing security protocols with secrecy types and logic programs
- Breaking and fixing public-key Kerberos
- Formal analysis of Kerberos 5
- Title not available (Why is that?)
- Three systems for cryptographic protocol analysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographically sound security proofs for basic and public-key Kerberos
Cited In (8)
- Title not available (Why is that?)
- Cryptographically sound security proofs for basic and public-key Kerberos
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Rule-based static analysis of network protocol implementations
- Bounded memory Dolev-Yao adversaries in collaborative systems
- Formal analysis of Kerberos 5
- Protocol composition logic (PCL)
- Breaking and fixing public-key Kerberos
Uses Software
This page was built for publication: Breaking and fixing public-key Kerberos
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2482453)