Skip to main content

Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, at times, well-equipped intruders succeed in breaking encryption and compromising data integrity, confidentiality and trust. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves temporary interruption to link server access with a new authentication protocol that delays the decryption with timed authentication. The analysis and verification of authentication properties and results of the designed protocol are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi and R. Needham “Prudent Engineering for Cryptographic Protocols.” IEEE Transactions on Software Engineering, vol. 22(1): pp. 6-15, 1996.

    Article  Google Scholar 

  2. S. M. Bellovin, and M. Merritt, “Limitations of the Kerberos Authentication System.” USENIX winter 1991,pp.253-268. 1991.

    Google Scholar 

  3. A. H. Eneh., O. Gemikonakli and R. Comley, “Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities”, The Fifth Security Conference 2006, Las Vegas, Nevada, April 2006, ISBN: 0-9772107-2-3.

    Google Scholar 

  4. A. Harbitter and D. A. Menascé, “A Methodology for Analyzing the Performance of Authentication Protocols”. ACM Transactions on Information and System Security, vol. 5(4): pp. 458-491, 2002.

    Google Scholar 

  5. C. A. Hoare, “Communication Sequence Process”. Prentice- Hall, International Englewood Cliffs. New Jersey. 1985.

    Google Scholar 

  6. Y. Kirsal, A. Eneh and O. Gemikonakli, “A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks”. PGNET2005, Liverpool UK, pp.333-339, 2005.

    Google Scholar 

  7. Y. Kirsal and O. Gemikonakli, “An Authentication Protocol to Address the Problem of the Trusted 3rd Party Authentication Protocols”, CISSE 2006,2006.

    Google Scholar 

  8. Y. Kirsal and O. Gemikonakli, “Frequent Key Renewal under Pseudo-Secure Conditions for Increased Security In Kerberos Authentication And Its Impact On System Performability”, 3rd International Conference on Global E-Security,University of East London (UeL), Docklands, UK, 2007.

    Google Scholar 

  9. G. Lowe, “An Attack on the Needham-Schroeder Public-key Authentication Protocol.” Information Processing Letters. vol: 56(3), pp. 131-133, 1995.

    Article  MATH  Google Scholar 

  10. G. Lowe, “Some New Attacks upon Security Protocols”, Proceedings of 9 th IEEE Computer Security Workshops, pp. 162 - 170, 1996.

    Google Scholar 

  11. G. Lowe, “CASPER: A Compiler for the Analysis of Security Protocols”. Proceedings of the 10 th Computer Security Foundation Workshop. pp.18-30., 1998

    Google Scholar 

  12. A. Mishra and W. A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1X Standard”, White paper, UMIACS-TR-2002-10, February 2002.

    Google Scholar 

  13. M. R. Needham and M.D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers.” Communication ACM (21) pp.993- 999, 1978.

    Article  MATH  Google Scholar 

  14. A. W. Roscoe “CSP and Determinism in Security Modelling”. IEEE Symposium on Security and Privacy. pp. 114-127, 1995.

    Google Scholar 

  15. S. Schneider. “Verifying authentication protocols with CSP” 10th Computer Security Foundations Workshop, IEEE. pp. 741-758, 1997.

    Google Scholar 

  16. “Security White Paper Evolution, Requirements, and Options” Available: http:wifiplanet.comtutorials articles.php965471 [Accessed: 27 April 2005] [Last Accessed: 13 September 2007].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Kirsal, Y., Gemikonakli, O. (2008). Further Improvements to the Kerberos Timed Authentication Protocol. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds) Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8737-0_99

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8737-0_99

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8736-3

  • Online ISBN: 978-1-4020-8737-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics