Toward a secure Kerberos key exchange with smart cards

被引:0
|
作者
Nikos Mavrogiannopoulos
Andreas Pashalidis
Bart Preneel
机构
[1] KU Leuven,Department of Electrical Engineering/COSIC
[2] iMinds,undefined
关键词
Kerberos; Smart cards; PKINIT;
D O I
暂无
中图分类号
学科分类号
摘要
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol.
引用
收藏
页码:217 / 228
页数:11
相关论文
共 50 条
  • [21] Secure Negotiation Approach for Share-Secret-Key of Kerberos Service
    Cao, Lai-Cheng
    ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, PT II, 2011, 7003 : 101 - 107
  • [22] Secure log file download mechanisms for smart cards
    Markantonakis, C
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 285 - 304
  • [23] TrustedPals: Secure multiparty computation implemented with smart cards
    Fort, Milan
    Freiling, Felix
    Draque Pens, Lucia
    Benenson, Zinaida
    Kesdogan, Dogan
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 34 - 48
  • [24] Secure Session Key Exchange Scheme for Smart Grid Home Area Networks
    Tizazu, Gebere Akele
    Hussen, Hassen Redwan
    Kim, Ki-Hyung
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 1116 - 1120
  • [25] A provable secure access control using smart cards
    Yang, FY
    Jan, JK
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1223 - 1226
  • [26] Kerberos: A secure passport
    Salowey, Joseph
    Unix Review, 1998, 16 (10):
  • [27] Secure and efficient AES software implementation for smart cards
    Trichina, E
    Korkishko, L
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 425 - 439
  • [28] An asymmetric cryptography secure channel protocol for smart cards
    Rantos, K
    Markantonakis, K
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 351 - 365
  • [29] DOES CATALYST HAVE THE KEY TO SMART CARDS
    不详
    ELECTRONICS, 1986, 59 (37): : 59 - 62
  • [30] Session key distribution using smart cards
    Shoup, V
    Rubin, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 321 - 331