2010
DOI: 10.4236/jis.2010.12006
|View full text |Cite
|
Sign up to set email alerts
|

Extending the Strand Space Method with Timestamps: Part I the Theory

Abstract: In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model protocol mixture. The main idea is to introduce a new relation a to model the causal relation between one primary proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…There are many other applications where assurance of an actual time is required. A good example could be Kerberos Protocol [37,38,39], where the time of a server and the time of clients must be synchronized. Our scheme can be applied there: when a client detects that his time is desynchronized, he should synchronize it with a trusted host (server).…”
Section: Future Work and Conclusionmentioning
confidence: 99%
“…There are many other applications where assurance of an actual time is required. A good example could be Kerberos Protocol [37,38,39], where the time of a server and the time of clients must be synchronized. Our scheme can be applied there: when a client detects that his time is desynchronized, he should synchronize it with a trusted host (server).…”
Section: Future Work and Conclusionmentioning
confidence: 99%
“…Dalal et al [20] provided a comparative and evaluation study for tools used in verification of security protocols. In another related work, Li [21] and Pand extended the strand space method to include time and timstamps to model the notion of recency in Kerberos protocol.…”
Section: Related Workmentioning
confidence: 99%