Improved Kerberos Security Protocol Evaluation using Modified BAN Logic

@article{Abdelmajid2010ImprovedKS,
  title={Improved Kerberos Security Protocol Evaluation using Modified BAN Logic},
  author={Nabih T. Abdelmajid and M. Alamgir Hossain and Simon J. Shepherd and Khaled W. Mahmoud},
  journal={2010 10th IEEE International Conference on Computer and Information Technology},
  year={2010},
  pages={1610-1615}
}
Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. There are many evaluation tools such as BAN Logic to evaluate how secure authentication protocols' messages are. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure. We… Expand
Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication Protocol
Now a day computer networks are growing day by day. With this growth these networks are required to be inter connected with each other which leads to the major usage of internet. Although internetExpand
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
TLDR
A reduction-based security proof of Kerberos authentication and key establishment is given, showing that it is a secure authentication protocol under standard assumptions on its encryption scheme and that the hash of the main session key is also a secure session key under Krawczyk’s generalization of the authenticated and confidential channel establishment (ACCE) model. Expand
Nonce-based Kerberos is a Secure Delegated AKE Protocol
TLDR
A variant of the Kerberos protocol is proposed, where nonces are used instead of timestamps, which requires one additional protocol message, but enables a proof in the standard Bellare-Rogaway (BR) model. Expand
Replay Attack Prevention in Kerberos Authentication Protocol Using Triple Password
TLDR
This paper presents an improved method which prevents replay attacks and password attacks by using Triple password scheme, which helps to prevent Replay attack. Expand
High-speed Railway Environmental Monitoring Data Identity Authentication Scheme Based on Consortium Blockchain
TLDR
This paper solves the problem of unauthentic between sensor nodes by utilizing the characteristics of decentralization, non-tampering and privacy protection of Blockchain, and proposes high-speed railway environmental monitoring data based on Consortium Blockchain, Identity authentication scheme. Expand
Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos
TLDR
This paper describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos and adds one more layer of security by considering a secret share as one of the factor of providing mutual authentication. Expand
List of Selected Publications
(1995), "Heterogeneous and homogenous architecture for real-time active vibration control",

References

SHOWING 1-10 OF 37 REFERENCES
Security Analysis of the Kerberos Protocol Using BAN Logic
  • K. Fan, H. Li, Yue Wang
  • Computer Science
  • 2009 Fifth International Conference on Information Assurance and Security
  • 2009
TLDR
A security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerbero protocol are proved. Expand
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols. Expand
Network security - private communication in a public world
TLDR
Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Expand
Limitations of the Kerberos authentication system
TLDR
A number of problems in the Kerberos authentication system, a part of MIT's Project Athena, are discussed, and solutions to some of them are presented. Expand
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication
In this paper we make a formal analysis of one-time password protocols using BAN logic and provide some guidelines to integrate securely one-time passwords with smartcard based authentication. WeExpand
An authentication service for open network systems
TLDR
The design aims to propose and study an API for integrating the authorization service into application programs, and to develop a better understanding of anonymous authorization and a formal understanding of authenticated delegation. Expand
Full agreement in BAN kerberos
  • A. Mukhamedov
  • Computer Science
  • Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
  • 2005
TLDR
The protocol is formalized in the strand spaces model and it is shown that BAN Kerberos guarantees the strongest form of authentication in Lowe's hierarchy of authentication specifications - full agreement on all data items. Expand
Kerberos authentication and authorization system
This document describes the assumptions, short and long term goals, and system model for a network authentication system, named Kerberos, for the Athena environment. An appendix specifies theExpand
The Design and Analysis of Cryptographic Application Programming Interfaces for Security Devices
TLDR
A number of innovative attacks are presented with significant implications for financial transaction systems (e.g. ATM networks) that challenge previous assertions of their security, integrity and robustness. Expand
The Kerberos Network Authentication Service (Version 5)
  • T. Yu
  • Computer Science
  • 2007
This document specifies version 5 of the Kerberos network authentication protocol. It obsoletes RFC 4120, and in addition to providing a detailed description of the protocol, it describes a frameworkExpand
...
1
2
3
4
...