学位论文详细信息
Bootstrapping Secure Multicast using Kerberized Multimedia Internet Keying
MIKEY;Kerberos;Multicast Security;Multimedia Internet Keying;Protocol Composition Logic;Electrical and Computer Engineering
Woo, Jeffrey Lok Tin
University of Waterloo
关键词: MIKEY;    Kerberos;    Multicast Security;    Multimedia Internet Keying;    Protocol Composition Logic;    Electrical and Computer Engineering;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/6635/1/Woo_Jeffrey_Lok_Tin.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】

We address bootstrapping secure multicast in enterprise and public-safety settings. Our workis motivated by the fact that secure multicast has important applications in such settings, and thatthe application setting significantly influences the design of security systems and protocols.This document presents and analyzes two designs for the composition of the authenticationprotocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY). Thetwo designs are denoted to be KM1 and KM2 . The main aspect in which the objective impactsthe design is the assumption of an additional trusted third party (called a Key Server) that is thefinal arbiter on whether a principal is authorized to receive a key.Secure composition can be a challenge, and therefore the designs were kept to be simple sothey have intuitive appeal. Notwithstanding this, it was recognized that even simple, seeminglysecure protocols can have flaws. Two main security properties of interest called safety and avail-ability were articulated. A rigorous analysis of KM1 and KM2 was conducted using ProtocolComposition Logic (PCL), a symbolic approach to analyzing security protocols, to show that thedesigns have those properties.The value of the analysis is demonstrated by a possible weakness in KM1 that was discoveredwhich lead to the design of KM2 . A prototype of KM1 and KM2 was implemented starting withthe publicly available reference implementation of Kerberos, and an open-source implementationof MIKEY. This document also discusses the experience from the implementation, and presentempirical results which demonstrate the inherent trade-off between security and performance inthe design of KM1 and KM2 .

【 预 览 】
附件列表
Files Size Format View
Bootstrapping Secure Multicast using Kerberized Multimedia Internet Keying 553KB PDF download
  文献评价指标  
  下载次数:5次 浏览次数:14次