KERBEROS SECURITY EVALUATION
Abstract
Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. A common methodology depends on the national standardizations is used to evaluate security of that authentication scenarios of Kerberos protocol.
Downloads
References
Debble Landon et al. "IBM System i Security Guide", IBM Redbooks, Oct 2006
Nalini K. Ratha and Ruud Bolle, "Smart Card based Authentication"
Microsoft Windows 2000 Server, Smart Card Logon, White Paper, Microsoft Co., 1999
Jan De Clercq ," Windows Server 2003 security infrastructures", October 2004
J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510 ,September 1993
Stefan Stadlober Bakk, "An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures ", July 2005, TUG
Microsoft Windows 2003 Server, Technical Overview of Security for Windows Server, Microsoft Corporation, July 2002
Tariq Assaf, "Smart Card Technology and Integration", April 2001
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. 17th International Conference on Computer Aided Verification, 2005
Naomaru Itoi and Peter Honeyman, "Smartcard Integration with Kerberos V5", CITI, December 1998
Mark Lobel, "Case for Strong User Authentication ", RSA Security Inc.
The PROMELA Language
http://www.dai-arc.polito.it/daiarc/manual/tools/jcat/main/node168.html.
Gary Ian Gaskell, "Integrating Smart Cards into Kerberos", Master Thesis, Feb 2000
T. Bolognesi and E. Brinksma, "Introduction to the iso specification language lotos",COMP. NETWORKS ISDN SYST., 14(1):25–59, 1987.
Faheem Khan ," Simplify enterprise Java authentication with single sign-on", IBM, Sep 2005
Visa Payment Card Industry Data Security Standard, http://usa.visa.com/download/business/ accepting _visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf
Merchant e-solutions Payment Card Industry (PCI) Data Security Standard http://www.merchante-solutions.net/infosecurity/mandates.htm
Published
How to Cite
Issue
Section
Copyright (c) 2008 Mohammad Najm Abdullah , May T. Abdul-Hadi, Hussain Mahdi
This work is licensed under a Creative Commons Attribution 4.0 International License.