Modeling and verification of kerberos protocol using symbolic model verifier

Punit Mundra, Shobhit Shukla, Madhavi Sharma, Radhika M. Pai, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Authentication is one of the biggest issues concerning information security in the context of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder, Kerberos protocol etc. The aim of this paper is to verify and formalize the Kerberos protocol using NuSMV model checker. The protocol version used in this paper is Kerberos version 4. The paper suggests CTL specifications for authentication, secrecy and integrity. We have also proposed an approach to identify presence of intruder in the system.

Original languageEnglish
Title of host publicationProceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011
Pages651-654
Number of pages4
DOIs
Publication statusPublished - 2011
Event2011 International Conference on Communication Systems and Network Technologies, CSNT 2011 - Katra, Jammu, India
Duration: 03-06-201105-06-2011

Conference

Conference2011 International Conference on Communication Systems and Network Technologies, CSNT 2011
Country/TerritoryIndia
CityKatra, Jammu
Period03-06-1105-06-11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Modeling and verification of kerberos protocol using symbolic model verifier'. Together they form a unique fingerprint.

Cite this