Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V
نویسندگان
چکیده
In this paper, we show how to use the novel extended strand space method to verify Kerberos V. First, we formally model novel semantical features in Kerberos V such as timestamps and protocol mixture in this new framework. Second, we apply unsolicited authentication test to prove its secrecy and authentication goals of Kerberos V. Our formalization and proof in this case study have been mechanized using Isabelle/HOL.
منابع مشابه
Extending the Strand Space Method with Timestamps: Part I the Theory
In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model p...
متن کاملMixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related problem of mixed protocols, and show that a protocol can remain correct even when used in combination with a range of other protocols. We illustrate the method with the familiar OtwayRees [10, 1] protocol. We identify a simp...
متن کاملVerifying Security Protocols with Timestamps via Translation to Timed Automata
In this paper we show a general method of proving authentication and integrity of time dependent security protocols by applying powerful model checking tools originally developed for verifying properties of timed automata. Our approach consists in specifying a security protocol, possibly with timestamps, in a higher-level language and translating automatically the specification to a timed autom...
متن کاملApplication of glauconite and fossil palynomorphs in reconstructing the Liassic paleogeography just before the opening of the Gulf of Mexico (Part II)
In (Part I), it was stated that red beds, conglomerates and salt were considered azoic and problematic rocks, but Paleopalynology and Inorganic Geochemistry proved to be useful for placing them in time and space. In the early last century, in Mexican NE region, only three Mesozoic red bed units were differentiated, dated as Late Triassic to Late Jurassic. It was important stratigraphically to p...
متن کاملNonce-based Kerberos is a Secure Delegated AKE Protocol
Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft’s Active Directory and shipped with every major operating system, and second because it served as a model for all Single-Sign-On protocols (e.g. SAML, OpenID, MS Cardspace, OpenID Connect). Its security has been confirmed with several Dolev-Yao style proofs [1–12], ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Information Security
دوره 1 شماره
صفحات -
تاریخ انتشار 2010