Joe-Kai Tsay
University of Pennsylvania
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joe-Kai Tsay.
Information & Computation | 2008
Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay; Christopher Walstad
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF to change the specification of PKINIT and Microsoft to release a security update for some Windows operating systems. We discovered this attack as part of an ongoing formal analysis of the Kerberos protocol suite, and we have formally verified several possible fixes to PKINIT-including the one adopted by the IETF-that prevent our attack as well as other authentication and secrecy properties of Kerberos with PKINIT.
International Journal of Information Security | 2011
Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay
We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev–Yao style model of Backes, Pfitzmann, and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This work was the first verification at the computational level of such a complex fragment of an industrial protocol. By considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev–Yao model to cryptographically sound results in the computational model.
computer and communications security | 2008
Bruno Blanchet; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay
We present a computationally sound mechanized analysis of Kerberos 5, both with and without its public-key extension PKINIT. We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model; these are the first mechanical proofs of a full industrial protocol at the computational level. We also generalize the notion of key usability and use CryptoVerif to prove that this definition is satisfied by keys in Kerberos.
european symposium on research in computer security | 2006
Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay
We present a computational analysis of basic Kerberos and Kerberos with public-key authentication (PKINIT) in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev-Yao style model of Backes, Pfitzmann and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This is the most complex fragment of an industrial protocol that has yet been verified at the computational level. Considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev-Yao model to cryptographically sound results in the computational model.
international workshop on security | 2009
Endre Bangerter; Stefania Barzan; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and secure multiparty computation. Currently, first applications that critically rely on ZK-PoKs are being deployed in the real world. The most prominent example is Direct Anonymous Attestation (DAA), which was adopted by the Trusted Computing Group (TCG) and implemented as one of the functionalities of the cryptographic Trusted Platform Module (TPM) chip.
Archive | 2009
Endre Bangerter; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay
Lecture Notes in Computer Science | 2006
Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay
Archive | 2009
Endre Bangerter; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay
Archive | 2008
Andre Scedrov; Joe-Kai Tsay
IACR Cryptology ePrint Archive | 2006
Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay