Title
Formal Modeling and Analyzing Kerberos Protocol
Abstract
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the formal model. In that way, we can prove that the system protected by the protocol is indeed secure as it declared. The reasons for security can be fixed out formally as a reference to analyzing other protocols.
Year
DOI
Venue
2009
10.1109/CSIE.2009.64
CSIE (7)
Keywords
Field
DocType
csp method,formal modeling,key distribution mechanism,secure application,kerberos protocol,popular security protocol,analyzing kerberos protocol,formal model,communication participant,cryptographic protocols,key distribution,protocols,formal method,authentication,formal methods,formal verification,public key,cryptography,servers,communicating sequential processes,security,security protocol,synchronization
Wide Mouth Frog protocol,Cryptographic protocol,Computer science,Computer security,Computer network,General Inter-ORB Protocol,Otway–Rees protocol,Generic Security Service Algorithm for Secret Key Transaction,Kerberos,Authentication protocol,Universal composability
Conference
Citations 
PageRank 
References 
6
0.48
9
Authors
4
Name
Order
Citations
PageRank
Qin Li14714.89
Fan Yang222640.24
Huibiao Zhu358386.68
Longfei Zhu4356.10