메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 362-383

Cryptographically sound security proofs for basic and public-key Kerberos

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COPYRIGHTS; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 33750226088     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_23     Document Type: Conference Paper
Times cited : (14)

References (40)
  • 1
    • 85028112313 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of Internet security protocols and applications
    • Springer
    • The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Proc. of Computer-aided Verification (CAV). Springer, 2005. URL: www.avispa-project.org.
    • (2005) Proc. of Computer-aided Verification (CAV)
  • 2
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. TACS, pages 82-94, 2001.
    • (2001) Proc. TACS , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 3
  • 4
    • 35048863550 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    • Springer LNCS 3193
    • M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. ESORICS, pages 89-108. Springer LNCS 3193, 2004.
    • (2004) Proc. ESORICS , pp. 89-108
    • Backes, M.1
  • 6
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • Springer LNCS 2607
    • M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th STAGS, pages 675-686. Springer LNCS 2607, 2003.
    • (2003) Proc. 20th STAGS , pp. 675-686
    • Backes, M.1    Jacobi, C.2
  • 7
    • 10844233317 scopus 로고    scopus 로고
    • A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
    • M. Backes and B. Pfitzmann. A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
    • (2004) Journal on Selected Areas in Communications , vol.22 , Issue.10 , pp. 2075-2086
    • Backes, M.1    Pfitzmann, B.2
  • 8
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • June
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. CSFW04, pages 204-218, June 2004.
    • (2004) Proc. CSFW04 , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 9
    • 24344472288 scopus 로고    scopus 로고
    • Relating symbolic and cryptographic secrecy
    • April-June
    • M. Backes and B. Pfitzmann. Relating symbolic and cryptographic secrecy. IEEE Trans. Dependable Secure Comp., 2(2): 109-123, April-June 2005.
    • (2005) IEEE Trans. Dependable Secure Comp. , vol.2 , Issue.2 , pp. 109-123
    • Backes, M.1    Pfitzmann, B.2
  • 10
    • 27544482135 scopus 로고    scopus 로고
    • Relating symbolic and cryptographic secrecy
    • Extended version in IACR Cryptology ePrint Archive 2004/300
    • M. Backes and B. Pfitzmann. Relating symbolic and cryptographic secrecy. In Proc. 26th IEEE Symposium on Security & Privacy, pages 171-182, 2005. Extended version in IACR Cryptology ePrint Archive 2004/300.
    • (2005) Proc. 26th IEEE Symposium on Security & Privacy , pp. 171-182
    • Backes, M.1    Pfitzmann, B.2
  • 11
    • 33845526589 scopus 로고    scopus 로고
    • On the cryptographic key secrecy of the stregthened Yahalom protocol
    • To appear
    • M. Backes and B. Pfitzmann. On the cryptographic key secrecy of the stregthened Yahalom protocol. In Proceedings of 21st IFIP SEC'06, To appear.
    • Proceedings of 21st IFIP SEC'06
    • Backes, M.1    Pfitzmann, B.2
  • 12
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. CCS'03, pages 220-230, 2003.
    • (2003) Proc. CCS'03 , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 13
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • Springer LNCS 2808
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. ESORICS'03, pages 271-290. Springer LNCS 2808, 2003.
    • (2003) Proc. ESORICS'03 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 15
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • Springer LNCS 1485
    • G. Bella and L. C. Paulson. Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In Proc. ESORICS'98, pages 361-375. Springer LNCS 1485, 1998.
    • (1998) Proc. ESORICS'98 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 16
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer LNCS 773
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proc. CRYPTO '93, pages 232-249. Springer LNCS 773, 1994.
    • (1994) Proc. CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 19
    • 33646073024 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). In Proc. 3rd Theory of Cryptography Conference (TCC), 2006.
    • (2006) Proc. 3rd Theory of Cryptography Conference (TCC)
    • Canetti, R.1    Herzog, J.2
  • 22
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proc. ESOP-14, pages 157-171, 2005.
    • (2005) Proc. ESOP-14 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 23
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Springer LNCS 3580
    • A. Datta, A. Derek, J. Mitchell, V. Shmatikov, and M. Turuani. Probabilistic polynomial-time semantics for a protocol security logic. In Proc. ICALP, pages 16-29. Springer LNCS 3580, 2005.
    • (2005) Proc. ICALP , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.3    Shmatikov, V.4    Turuani, M.5
  • 25
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • D. Dolev and A. Yao. On the security of public-key protocols. IEEE Trans. Info. Theory, 2(29): 198-208, 1983.
    • (1983) IEEE Trans. Info. Theory , vol.2 , Issue.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 26
    • 0023545076 scopus 로고
    • How to play any mental game - Or - A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. STOC, pages 218-229, 1987.
    • (1987) Proc. STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 28
    • 0035750923 scopus 로고    scopus 로고
    • The faithfulness of abstract protocol analysis: Message authentication
    • J. D. Guttman, F. J. Thayer Fabrega, and L. Zuck. The faithfulness of abstract protocol analysis: Message authentication. In Proc. CCS-8, pages 186-195, 2001.
    • (2001) Proc. CCS-8 , pp. 186-195
    • Guttman, J.D.1    Thayer Fabrega, F.J.2    Zuck, L.3
  • 29
    • 85143166035 scopus 로고    scopus 로고
    • Security analysis and improvements for IEEE 802.111
    • C. He and J. C. Mitchell. Security Analysis and Improvements for IEEE 802.111. In Proc. NDSS'05, 2005.
    • (2005) Proc. NDSS'05
    • He, C.1    Mitchell, J.C.2
  • 30
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Springer LNCS 2729
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Proc. CRYPTO, pages 548-564. Springer LNCS 2729, 2003.
    • (2003) Proc. CRYPTO , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 32
    • 0345412676 scopus 로고    scopus 로고
    • Logics for reasoning about cryptographic constructions
    • R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. In Proc. FOCS, pages 372-381, 2003.
    • (2003) Proc. FOCS , pp. 372-381
    • Impagliazzo, R.1    Kapron, B.M.2
  • 33
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. Symp. Security and Privacy, pages 71-85, 2004.
    • (2004) Proc. Symp. Security and Privacy , pp. 71-85
    • Laud, P.1
  • 34
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the NRL protocol analyzer
    • C. Meadows. Analysis of the internet key exchange protocol using the NRL Protocol Analyzer. In Proc. IEEE Symp. Security and Privacy, pages 216-231, 1999.
    • (1999) Proc. IEEE Symp. Security and Privacy , pp. 216-231
    • Meadows, C.1
  • 35
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Springer LNCS 2951
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. TCC, pages 133-151. Springer LNCS 2951, 2004.
    • (2004) Proc. TCC , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 36
    • 84888829486 scopus 로고    scopus 로고
    • Aug.
    • Microsoft. Security Bulletin MS05-042. http://www.microsoft.com/technet/ security/bulletin/MS05-042.mspx, Aug. 2005.
    • (2005) Security Bulletin , vol.MS05-042
  • 37
    • 0345280512 scopus 로고    scopus 로고
    • A probabilistic polynominaltime process calculus for analysis of cryptographic protocols (preliminary report)
    • J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominaltime process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.47 , pp. 1-31
    • Mitchell, J.1    Mitchell, M.2    Scedrov, A.3    Teague, V.4
  • 38
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications, 32(9):33-38, Sept. 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, C.1    Ts'o, T.2
  • 40
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. S&P, pages 184-200, 2001.
    • (2001) Proc. S&P , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.