skip to main content
10.1145/2414456.2414490acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Security implications in Kerberos by the introduction of smart cards

Published:02 May 2012Publication History

ABSTRACT

Public key Kerberos (PKINIT) is a standardized authentication and key establishment protocol which is used by the Windows active directory subsystem. In this paper we show that card-based public key Kerberos is flawed. In particular, access to a user's card enables an adversary to impersonate that user even after the adversary's access to the card is revoked. The attack neither exploits physical properties of the card, nor extracts any of its secrets.

References

  1. A. Roy, A. Datta, and J. Mitchell. Formal proofs of cryptographic security of diffie-hellman-based protocols. In G. Barthe and C. Fournet, editors, Trustworthy Global Computing, volume 4912 of Lecture Notes in Computer Science, pages 312--329. Springer Berlin/Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Neuman, T. Yu, S. Hartman, and K. Raeburn. The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard), July 2005.Google ScholarGoogle Scholar
  3. V. Shoup and A. D. Rubin. Session key distribution using smart cards. In Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12--16, 1996, Proceeding, pages 321--331, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Zhu and B. Tung. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard), June 2006.Google ScholarGoogle Scholar

Index Terms

  1. Security implications in Kerberos by the introduction of smart cards

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
          May 2012
          119 pages
          ISBN:9781450316484
          DOI:10.1145/2414456

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 May 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader