TY - GEN
T1 - Modeling and verification of kerberos protocol using symbolic model verifier
AU - Mundra, Punit
AU - Shukla, Shobhit
AU - Sharma, Madhavi
AU - Pai, Radhika M.
AU - Singh, Sanjay
PY - 2011
Y1 - 2011
N2 - Authentication is one of the biggest issues concerning information security in the context of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder, Kerberos protocol etc. The aim of this paper is to verify and formalize the Kerberos protocol using NuSMV model checker. The protocol version used in this paper is Kerberos version 4. The paper suggests CTL specifications for authentication, secrecy and integrity. We have also proposed an approach to identify presence of intruder in the system.
AB - Authentication is one of the biggest issues concerning information security in the context of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder, Kerberos protocol etc. The aim of this paper is to verify and formalize the Kerberos protocol using NuSMV model checker. The protocol version used in this paper is Kerberos version 4. The paper suggests CTL specifications for authentication, secrecy and integrity. We have also proposed an approach to identify presence of intruder in the system.
UR - https://www.scopus.com/pages/publications/80052129540
UR - https://www.scopus.com/pages/publications/80052129540#tab=citedBy
U2 - 10.1109/CSNT.2011.140
DO - 10.1109/CSNT.2011.140
M3 - Conference contribution
AN - SCOPUS:80052129540
SN - 9780769544373
T3 - Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011
SP - 651
EP - 654
BT - Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011
T2 - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011
Y2 - 3 June 2011 through 5 June 2011
ER -