Analysing the kerberos timed authentication protocol using CSP-rank functions

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Despite advances in network security, malicious attacks have shown a significant increase in recent times. Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, given sufficient time, well-equipped intruders succeed in breaking encryptions and compromising system security. The protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. Communicating Sequential Processes (CSP) is an abstract language designed especially for the description of communication patterns. A notion of rank functions is introduced for analysing purposes as well. This paper presents an application of this formal approach to a newly designed authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under pseudo-secure situations. The analysis and verification of authentication properties and results of the designed protocol are presented and discussed. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kirsal, Y., & Gemikonakli, O. (2009). Analysing the kerberos timed authentication protocol using CSP-rank functions. In Communications in Computer and Information Science (Vol. 45, pp. 56–63). https://doi.org/10.1007/978-3-642-04062-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free