The Libraries will be performing system maintenance to UWSpace on Thursday, March 13th from 12:30 to 5:30 pm (EDT). UWSpace will be unavailable during this time.
 

Bootstrapping Secure Multicast using Kerberized Multimedia Internet Keying

dc.contributor.authorWoo, Jeffrey Lok Tin
dc.date.accessioned2012-04-24T18:39:14Z
dc.date.available2012-04-24T18:39:14Z
dc.date.issued2012-04-24T18:39:14Z
dc.date.submitted2012
dc.description.abstractWe address bootstrapping secure multicast in enterprise and public-safety settings. Our work is motivated by the fact that secure multicast has important applications in such settings, and that the application setting significantly influences the design of security systems and protocols. This document presents and analyzes two designs for the composition of the authentication protocol, Kerberos, and the key transport protocol, Multimedia Internet KEYing (MIKEY). The two designs are denoted to be KM1 and KM2 . The main aspect in which the objective impacts the design is the assumption of an additional trusted third party (called a Key Server) that is the final arbiter on whether a principal is authorized to receive a key. Secure composition can be a challenge, and therefore the designs were kept to be simple so they have intuitive appeal. Notwithstanding this, it was recognized that even simple, seemingly secure protocols can have flaws. Two main security properties of interest called safety and avail- ability were articulated. A rigorous analysis of KM1 and KM2 was conducted using Protocol Composition Logic (PCL), a symbolic approach to analyzing security protocols, to show that the designs have those properties. The value of the analysis is demonstrated by a possible weakness in KM1 that was discovered which lead to the design of KM2 . A prototype of KM1 and KM2 was implemented starting with the publicly available reference implementation of Kerberos, and an open-source implementation of MIKEY. This document also discusses the experience from the implementation, and present empirical results which demonstrate the inherent trade-off between security and performance in the design of KM1 and KM2 .en
dc.identifier.urihttp://hdl.handle.net/10012/6635
dc.language.isoenen
dc.pendingfalseen
dc.publisherUniversity of Waterlooen
dc.subjectMIKEYen
dc.subjectKerberosen
dc.subjectMulticast Securityen
dc.subjectMultimedia Internet Keyingen
dc.subjectProtocol Composition Logicen
dc.subject.programElectrical and Computer Engineeringen
dc.titleBootstrapping Secure Multicast using Kerberized Multimedia Internet Keyingen
dc.typeMaster Thesisen
uws-etd.degreeMaster of Applied Scienceen
uws-etd.degree.departmentElectrical and Computer Engineeringen
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Woo_Jeffrey_Lok_Tin.pdf
Size:
553.54 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
246 B
Format:
Item-specific license agreed upon to submission
Description: