Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joe-Kai Tsay is active.

Publication


Featured researches published by Joe-Kai Tsay.


Information & Computation | 2008

Breaking and fixing public-key Kerberos

Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay; Christopher Walstad

We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF to change the specification of PKINIT and Microsoft to release a security update for some Windows operating systems. We discovered this attack as part of an ongoing formal analysis of the Kerberos protocol suite, and we have formally verified several possible fixes to PKINIT-including the one adopted by the IETF-that prevent our attack as well as other authentication and secrecy properties of Kerberos with PKINIT.


International Journal of Information Security | 2011

Cryptographically sound security proofs for basic and public-key Kerberos

Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay

We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev–Yao style model of Backes, Pfitzmann, and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This work was the first verification at the computational level of such a complex fragment of an industrial protocol. By considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev–Yao model to cryptographically sound results in the computational model.


computer and communications security | 2008

Computationally sound mechanized proofs for basic and public-key Kerberos

Bruno Blanchet; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay

We present a computationally sound mechanized analysis of Kerberos 5, both with and without its public-key extension PKINIT. We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model; these are the first mechanical proofs of a full industrial protocol at the computational level. We also generalize the notion of key usability and use CryptoVerif to prove that this definition is satisfied by keys in Kerberos.


european symposium on research in computer security | 2006

Cryptographically sound security proofs for basic and public-key kerberos

Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay

We present a computational analysis of basic Kerberos and Kerberos with public-key authentication (PKINIT) in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev-Yao style model of Backes, Pfitzmann and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This is the most complex fragment of an industrial protocol that has yet been verified at the computational level. Considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev-Yao model to cryptographically sound results in the computational model.


international workshop on security | 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice

Endre Bangerter; Stefania Barzan; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay

Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and secure multiparty computation. Currently, first applications that critically rely on ZK-PoKs are being deployed in the real world. The most prominent example is Direct Anonymous Attestation (DAA), which was adopted by the Trusted Computing Group (TCG) and implemented as one of the functionalities of the cryptographic Trusted Platform Module (TPM) chip.


Archive | 2009

On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge

Endre Bangerter; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay


Lecture Notes in Computer Science | 2006

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos

Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay


Archive | 2009

On the Design and Implementation of Ecient Zero-Knowledge Proofs of Knowledge

Endre Bangerter; Stephan Krenn; Ahmad-Reza Sadeghi; Thomas Schneider; Joe-Kai Tsay


Archive | 2008

Formal analysis of the kerberos authentication protocol

Andre Scedrov; Joe-Kai Tsay


IACR Cryptology ePrint Archive | 2006

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.

Michael Backes; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Joe-Kai Tsay

Collaboration


Dive into the Joe-Kai Tsay's collaboration.

Top Co-Authors

Avatar

Andre Scedrov

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Iliano Cervesato

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thomas Schneider

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Endre Bangerter

Bern University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Stephan Krenn

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge