An Authentication Protocol to Address the Problem of the Trusted 3rd Party Authentication Protocols

  • Y. Kirsal
  • O. Gemikonakli


The development of authentication protocols to secure networks, data and resources is one of the main interests in ensuring secure communication in modern world. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents a general approach for the analysis and verification of authentication properties in Kerberos. The work presented is an attempt to combine Kerberos and Key-Exchange Protocol with the aid of the security protocol compiler, CASPER and the Failures-Divergence Refinement (FDR) in order to minimize the success of attacks against protocol's authentication. FDR is used to generate Communicating Sequential Processes (CSP) definition of the protocol. An authentication protocol has been developed to improve secure authentication in Kerberos.


Wireless Local Area Network Authentication Protocol Security Protocol Proxy Server Authentication Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    M. Abadi and R. Needham. “Prudent Engineering for Cryptographic Protocols.” IEEE Transactions on Software Engineering, vol. 22(1): pp. 6-15, 1996CrossRefGoogle Scholar
  2. [2]
    S. M. Bellovin, and M. Merritt. “Limitations of the Kerberos Authentication System”. USENIX winter 1991, pp.253-268. 1991Google Scholar
  3. [3]
    A. W. Roscoe “CSP and Determinism in Security Modelling”. IEEE Symposium on Security and Privacy. pp. 114-127, 1995Google Scholar
  4. [4]
    G. Lowe. “CASPER: A Compiler for the Analysis of Security Protocols”. Proceedings of the 10 th Computer Security Foundation Workshop. pp.18-30., 1998Google Scholar
  5. [5]
    A. Harbitter and D. A. Menascé. “A Methodology for Analyzing the Performance of Authentication Protocols”. ACM Transactions on Information and System Security, vol. 5(4): pp. 458-491, 2002.CrossRefGoogle Scholar
  6. [6]
    C. A. Hoare. “Communication Sequence Process”. Prentice- Hall, International Englewood Cliffs. New Jersey. 1985Google Scholar
  7. [7]
    G. Lowe. “An Attack on the Needham-Schroeder Public-key Authentication Protocol. ”Information Processing Letters. Vol: 56(3), pp. 131-133, 1995.MATHCrossRefGoogle Scholar
  8. [8]
    A. Mishra and W. A. Arbaugh. “An Initial Security Analysis of the IEEE 802.1X Standard”, White paper, UMIACS-TR-2002-10, February 2002.Google Scholar
  9. [9]
    M. R. Needham and M.D. Schroeder. “Using Encryption for Authentication in Large Networks of Computers.” Communication ACM (21) pp.993–999, 1978Google Scholar
  10. [10]
    Y. Kirsal, A. Eneh and O. Gemikonakli, “A Solution to the Problem of Trusted Third Party for IEEE 802.11b Networks”. PGNET2005, Liverpool UK, pp.333-339, 2005Google Scholar
  11. [11]
    S. Schneider. “Verifying authentication protocols with CSP” 10th Computer Security Foundations Workshop, IEEE. pp.741-758, 1997Google Scholar
  12. [12]
    [12] “Security White Paper Evolution, Requirements, and Options” Available: [Accessed: 27 April 2005]Google Scholar
  13. [13]
    A. H. Eneh., O. Gemikonakli and R. Comley. “Security of Electronic Commerce Authentication Protocols in Economically Deprived Communities”, The Fifth Security Conference 2006, Las Vegas, Nevada, April 2006, ISBN: 0-9772107-2-3.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • Y. Kirsal
    • 1
  • O. Gemikonakli
    • 1
  1. 1.The Burroughs,HendonMiddlesex UniversityLondonUK

Personalised recommendations