Systems Engineering and Electronics
Previous Articles Next Articles
ZHANG Chen, GAO Xiaoliang
Online:
Published:
Abstract:
Kerberos authentication is one of the information security technologies for the cloud computing security. The formal verification of the Kerberos protocol helps to discover and avoid the protocol design flaws and attacks. An automatic tool named SPEAR Ⅱ for modeling and analyzing security protocols is used to analyze the security of the Kerberos protocol. Firstly, three attack scenarios such as eavesdropping, replay and tampering are designed and characteristics of communication partners in each scenario are researched. Then, several hypothesizes are proposed, which are used as the input of a Prolog based analyzer in SPEAR Ⅱ to reason the working of the Kerberos protocol. The results show that the Kerberos protocol can keep the key safety between legal communication partners in the eavesdropping and replay attack scenarios, but the attacker can use a fake key to communicate with a legal user in the tampering attack scenario.
ZHANG Chen, GAO Xiaoliang. Security analysis of Kerberos protocol based on SPEAR Ⅱ[J]. Systems Engineering and Electronics, doi: 10.3969/j.issn.1001506X.2015.10.16.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.sys-ele.com/EN/10.3969/j.issn.1001506X.2015.10.16
https://www.sys-ele.com/EN/Y2015/V37/I10/2292