Kerberos version IV: Inductive analysis of the secrecy goals

86Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

An operational model of crypto-protocols is tailored to the detailed analysis of the secrecy goals accomplished by Kerberos Version IV. The model is faithful to the specification of the protocol presented by the MIT technical plan [14] — e.g. timestamping, double session key delivery mechanism are included. It allows an eavesdropper to exploit the shared keys of compromised agents, and admits the accidental loss of expired session keys. Confidentiality is expressed from the viewpoint of each party involved in a protocol run, with particular attention to the assumptions the party relies on. If such assumptions are unrealistic, they highlight weaknesses of the protocol. This is particularly so from the viewpoint of the responder: The model suggests and proves a reasonable correction.

Cite

CITATION STYLE

APA

Bella, G., & Paulson, L. C. (1998). Kerberos version IV: Inductive analysis of the secrecy goals. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1485, pp. 361–375). Springer Verlag. https://doi.org/10.1007/BFb0055875

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free