• Corpus ID: 15746767

Specification , Simulation and Validation of Kerberos Protocol against replay attack using SPIN

@inproceedings{Benarous2014SpecificationS,
  title={Specification , Simulation and Validation of Kerberos Protocol against replay attack using SPIN},
  author={Leila Benarous and Mohamed Djoudi},
  year={2014}
}
The general context of this paper is the verification of the Kerberos authentication protocol and its immunity against the replay-attack. A Promela model of the protocoland the intruder executing a replay-attack was build; this model will be simulated and verified using the powerful tool spin. The results prove that the protocol is against the replay attack as it is announced. 

Figures from this paper

References

SHOWING 1-9 OF 9 REFERENCES

Using SPIN to Verify Security Properties of Cryptographic Protocols

Using the model built, Spin can find a known attack on the protocol, and it correctly validates the fixed version of the protocol.

Design and Validation of Computer Protocols

A standard form of protocol implementation in CSP is shown, how authentication properties can be captured as trace specifications are shown, basic definitions necessary to reason about the unbounded set of messages are given, and the central rank function theorem is reformulates and restates it proof.

Spin Model Checker, ThePrimer and Reference Manual

  • 2003

Un exemple de langage parallèle asynchrone : Promela

  • 1999

Security protocol verification using SPIN, SPIN'95 Workshop

  • 1995

The Kerberos Network Authentication Service

    Kerberos Authentication and Authorization System: Figure 6: Verification of safety propriety

      Using SPIN to verify security

      • Properties of cryptographic protocols,
      • 2002

      The Definitive Guide

      • 2003