首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于SPEAR Ⅱ的Kerberos协议安全性分析
引用本文:张琛,郜晓亮.基于SPEAR Ⅱ的Kerberos协议安全性分析[J].系统工程与电子技术,2015,37(10):2292-2297.
作者姓名:张琛  郜晓亮
作者单位:(国防科学技术大学电子科学与工程学院, 湖南 长沙 410073)
摘    要:Kerberos认证是云计算安全采用的信息安全技术之一,对Kerberos协议进行形式化验证可以有效发现和避免协议设计缺陷和攻击。采用一种自动安全协议建模和分析工具SPEAR Ⅱ对Kerberos协议的安全性进行了分析。首先设计了窃听、重放和篡改攻击场景并分析了以上场景中通信主体的特点,在此基础上提出推理假设,然后通过SPEAR Ⅱ中基于Prolog的分析引擎从协议假设条件推导到协议目标。结果表明,Kerberos协议可以抵抗窃听和重放攻击,保护合法用户密钥的安全,但在篡改攻击下,若信任主体被攻陷,则攻击者可以通过伪造密钥骗取合法用户的信任,并与合法用户建立通信。


Security analysis of Kerberos protocol based on SPEAR Ⅱ
ZHANG Chen,GAO Xiao liang.Security analysis of Kerberos protocol based on SPEAR Ⅱ[J].System Engineering and Electronics,2015,37(10):2292-2297.
Authors:ZHANG Chen  GAO Xiao liang
Institution:(School of Electronic Science and Engineering, National University of; Defense Technology, Changsha 410073, China)
Abstract:Kerberos authentication is one of the information security technologies for the cloud computing security. The formal verification of the Kerberos protocol helps to discover and avoid the protocol design flaws and attacks. An automatic tool named SPEAR Ⅱ for modeling and analyzing security protocols is used to analyze the security of the Kerberos protocol. Firstly, three attack scenarios such as eavesdropping, replay and tampering are designed and characteristics of communication partners in each scenario are researched. Then, several hypothesizes are proposed, which are used as the input of a Prolog based analyzer in SPEAR Ⅱ to reason the working of the Kerberos protocol. The results show that the Kerberos protocol can keep the key safety between legal communication partners in the eavesdropping and replay attack scenarios, but the attacker can use a fake key to communicate with a legal user in the tampering attack scenario.
Keywords:
点击此处可从《系统工程与电子技术》浏览原始摘要信息
点击此处可从《系统工程与电子技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号