메뉴 건너뛰기




Volumn , Issue , 2007, Pages 92-97

Provable-security analysis of authenticated encryption in Kerberos

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATIONAL METHODS; DATA PRIVACY; NETWORK PROTOCOLS; STANDARDIZATION; VERIFICATION;

EID: 34548797158     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.19     Document Type: Conference Paper
Times cited : (21)

References (27)
  • 1
    • 34548737451 scopus 로고    scopus 로고
    • Cryptographically sound security proofs for basic and public-key Kerberos
    • Springer
    • M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. In ESORICS '06. Springer, 2006.
    • (2006) ESORICS '06
    • Backes, M.1    Cervesato, I.2    Jaggard, A.D.3    Scedrov, A.4    Tsay, J.-K.5
  • 2
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • IEEE
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In CSFW '04. IEEE, 2004.
    • (2004) CSFW '04
    • Backes, M.1    Pfitzmann, B.2
  • 3
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • ACM
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In CCS '03. ACM, 2003.
    • (2003) CCS '03
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 4
    • 3543098326 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • Springer
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In ESORICS '03. Springer, 2003.
    • (2003) ESORICS '03
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 5
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version 4: Inductive analysis of the secrecy goals
    • Springer
    • G. Bella and L. C. Paulson. Kerberos version 4: Inductive analysis of the secrecy goals. In ESORICS '98. Springer, 1998.
    • (1998) ESORICS '98
    • Bella, G.1    Paulson, L.C.2
  • 6
    • 3042537645 scopus 로고    scopus 로고
    • Formal analysis of the Kerberos authentication system
    • G. Bella and E. Riccobene. Formal analysis of the Kerberos authentication system. Journal of Universal Computer Science, 3(12):1337-1381, 1997.
    • (1997) Journal of Universal Computer Science , vol.3 , Issue.12 , pp. 1337-1381
    • Bella, G.1    Riccobene, E.2
  • 7
    • 38549138054 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • M. Bellare. New proofs for NMAC and HMAC: Security without collision-resistance. In CRYPTO, 2006.
    • (2006) CRYPTO
    • Bellare, M.1
  • 8
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Springer
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO '96. Springer, 1996.
    • (1996) CRYPTO '96
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
    • 0031351741 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption
    • IEEE
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In FOCS '97. IEEE, 1997.
    • (1997) FOCS '97
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 10
    • 0003372190 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Springer
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. In CRYPTO '04. Springer, 2004.
    • (2004) CRYPTO '04
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 11
    • 0037673373 scopus 로고    scopus 로고
    • Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol
    • ACM
    • M. Bellare, T. Kohno, and C. Namprempre. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In CCS '02. ACM, 2002.
    • (2002) CCS '02
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 12
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Springer
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIACRYPT '00. Springer, 2000.
    • (2000) ASIACRYPT '00
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 0010224361 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
    • Springer
    • M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In ASIACRYPT '00. Springer, 2000.
    • (2000) ASIACRYPT '00
    • Bellare, M.1    Rogaway, P.2
  • 14
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. SIGCOMM Comput. Commun. Rev., 20(5):119-132, 1990.
    • (1990) SIGCOMM Comput. Commun. Rev , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 15
    • 34548793805 scopus 로고    scopus 로고
    • Provable-security analysis of authenticated encryption in Kerberos
    • paper. Available at
    • A. Boldyreva and V. Kumar. Provable-security analysis of authenticated encryption in Kerberos. Full version of this paper. Available at http://www-static.cc.gatech.edu/~aboldyre/publications.html, 2007.
    • (2007) Full version of this
    • Boldyreva, A.1    Kumar, V.2
  • 16
    • 84948759231 scopus 로고    scopus 로고
    • A Formal Analysis of Some Properties of Kerberos 5 Using MSR
    • IEEE
    • F. Butler, I. Cervesato, A. D. Jaggard, and A. Scedrov. A Formal Analysis of Some Properties of Kerberos 5 Using MSR. In CSFW '02. IEEE, 2002.
    • (2002) CSFW '02
    • Butler, F.1    Cervesato, I.2    Jaggard, A.D.3    Scedrov, A.4
  • 18
    • 34548797456 scopus 로고
    • The use of encryption in Kerberos for network authentication (invited)
    • Springer
    • J. T. Kohl. The use of encryption in Kerberos for network authentication (invited). In CRYPTO '89. Springer, 1989.
    • (1989) CRYPTO '89
    • Kohl, J.T.1
  • 19
    • 34548804202 scopus 로고    scopus 로고
    • T. Kohno. Searchable symmetric encryption: Improved definitions and efficient constructions. UCSD Dissertation, 2006.
    • T. Kohno. Searchable symmetric encryption: Improved definitions and efficient constructions. UCSD Dissertation, 2006.
  • 21
  • 22
    • 34548709445 scopus 로고    scopus 로고
    • Network Working Group. Request for Comments:, Available at
    • K. Raeburn. Encryption and checksum specifications for Kerberos 5. Network Working Group. Request for Comments: 3961. Available at http://www.ietf.org/rfc/rfc3961.txt, 2005.
    • (2005) Encryption and checksum specifications for Kerberos , vol.5 , pp. 3961
    • Raeburn, K.1
  • 24
    • 19944425657 scopus 로고    scopus 로고
    • Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. ePrint Archive
    • Report 2004/199, Available at
    • X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. ePrint Archive: Report 2004/199, 2004. Available at http://eprint.iacr.org/.
    • (2004)
    • Wang, X.1    Feng, D.2    Lai, X.3    Yu, H.4
  • 25
    • 85180736317 scopus 로고    scopus 로고
    • A real-world analysis of Kerberos password security
    • The Internet Society
    • T. D. Wu. A real-world analysis of Kerberos password security. In NDSS '99. The Internet Society, 1999.
    • (1999) NDSS '99
    • Wu, T.D.1
  • 26
    • 34548714475 scopus 로고    scopus 로고
    • The Kerberos network authentication service (version 5). IETF Internet draft
    • T. Yu. The Kerberos network authentication service (version 5). IETF Internet draft. Request for Comments: 1510, 2006.
    • (2006) Request for Comments , pp. 1510
    • Yu, T.1
  • 27
    • 34548739961 scopus 로고    scopus 로고
    • T. Yu, S. Hartman, and K. Raeburn. The perils of unauthenticated encryption: Kerberos version 4. In NDSS '04. The Internet Society, 2004
    • T. Yu, S. Hartman, and K. Raeburn. The perils of unauthenticated encryption: Kerberos version 4. In NDSS '04. The Internet Society, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.