Using the NuSMV Model Checker to verify the Kerberos Protocol

作者: S. Tacconi , M. Panti L. Spalazzi

DOI:

关键词:

摘要: The aim of this paper is to present a methodology for verifying cryptographic protocols by means NuSMV, symbolic model checker. We illustrate approach describing our analysis the basic version Kerberos, widely used authentication protocol. most innovative feature constituted formal representation security requirements. Indeed, we propose an extension correspondence property, so far only authentication, other requirements, as secrecy and integrity. This generalization leads unifying view adequacy proved nding unpublished attack on Kerberos that may lead serious consequences systems adopt it.

参考文章(11)
Will Marrero, Edmund Clarke, Somesh Jha, Model Checking for Security Protocols Defense Technical Information Center. ,(1997) , 10.21236/ADA327281
C. Neuman, J. Kohl, The Kerberos Network Authentication Service (V5) RFC. ,vol. 1510, pp. 1- 112 ,(1993)
S. M. Bellovin, M. Merritt, Limitations of the Kerberos authentication system acm special interest group on data communication. ,vol. 20, pp. 119- 132 ,(1990) , 10.1145/381906.381946
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols ieee symposium on security and privacy. ,vol. 22, pp. 6- 15 ,(1994) , 10.1109/32.481513
T.Y.C. Woo, S.S. Lam, A semantic model for authentication protocols ieee symposium on security and privacy. pp. 178- 194 ,(1993) , 10.1109/RISP.1993.287633
B.C. Neuman, T. Ts'o, Kerberos: an authentication service for computer networks IEEE Communications Magazine. ,vol. 32, pp. 33- 38 ,(1994) , 10.1109/35.312841