2004
DOI: 10.1007/978-3-540-37621-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Confidentiality and Authentication in Kerberos 5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…Most demonstrated approaches for proving security of complex network protocols, of the scale that appear in IEEE and IETF standards, use a simplified model of protocol execution based on symbolic computation and highly idealized cryptography [7,16,21,25]. However, proofs about symbolic computation do not provide the same level of assurance as proofs about probabilistic polynomial-time attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Most demonstrated approaches for proving security of complex network protocols, of the scale that appear in IEEE and IETF standards, use a simplified model of protocol execution based on symbolic computation and highly idealized cryptography [7,16,21,25]. However, proofs about symbolic computation do not provide the same level of assurance as proofs about probabilistic polynomial-time attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Our formulation is based on the A level formalization of Kerberos V5 in [12]. Kerberos provides mutual authentication and establishes keys between clients and application servers, using a sequence of two-message interactions with trusted parties called the Kerberos Authentication Server (KAS) and the Ticket Granting Server (TGS).…”
Section: Syntax and Semanticsmentioning
confidence: 99%
“…In the symbolic model, protocol execution and the possible actions of an attacker are characterized using a symbolic model of computation that allows nondeterminism but does not incorporate probability or computational complexity bounds. In addition to many model checking and bug-finding efforts, there have been some significant correctness proofs carried using the symbolic model, including mechanically checked formal proofs [13,14], unformalized but mathematical proofs about a multiset rewriting model [15][16][17], and work using compositional formal logic approaches [18][19][20][21][22]. Several groups of researchers have taken steps to connect the symbolic model to the probabilistic polynomial-time computational model used in cryptographic studies, e.g., [23-29, 3, 4, 30].…”
Section: Introductionmentioning
confidence: 99%