作者: Giampaolo Bella , Lawrence C. Paulson
DOI: 10.1007/BFB0055875
关键词:
摘要: An operational model of crypto-protocols is tailored to the detailed analysis secrecy goals accomplished by Kerberos Version IV. The faithful specification protocol presented MIT technical plan [14] — e.g. timestamping, double session key delivery mechanism are included. It allows an eavesdropper exploit shared keys compromised agents, and admits accidental loss expired keys. Confidentiality expressed from viewpoint each party involved in a run, with particular attention assumptions relies on. If such unrealistic, they highlight weaknesses protocol. This particularly so responder: suggests proves reasonable correction.