Formal modeling and analyzing Kerberos protocol

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the formal model. In that way, we can prove that the system protected by the protocol is indeed secure as it declared. The reasons for security can be fixed out formally as a reference to analyzing other protocols.

Original languageEnglish
Title of host publication2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
Pages813-819
Number of pages7
DOIs
StatePublished - 2009
Event2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009 - Los Angeles, CA, United States
Duration: 31 Mar 20092 Apr 2009

Publication series

Name2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
Volume7

Conference

Conference2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009
Country/TerritoryUnited States
CityLos Angeles, CA
Period31/03/092/04/09

Fingerprint

Dive into the research topics of 'Formal modeling and analyzing Kerberos protocol'. Together they form a unique fingerprint.

Cite this