Security Analysis of the Kerberos protocol using BAN logic

被引:10
|
作者
Fan, Kai [1 ]
Li, Hui [1 ]
Wang, Yue [2 ]
机构
[1] Xidian Univ, Minist Edu, Key Lab Comp Network & Informat Secur, Xian, Shaanxi, Peoples R China
[2] Xian Branch Shaanxi Telecom Ltd, Xian, Peoples R China
关键词
Kerberos protocol; Formal analysis; BAN Iogic;
D O I
10.1109/IAS.2009.320
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [1] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [2] Formal Analysis for Security of Otway-Rees Protocol with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 590 - +
  • [3] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic
    Nabih, Abdelmajid
    Hossain, Alamgir
    Shepherd, Simon
    Khaled, Mahmoud
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
  • [4] Security analysis of Kerberos protocol based on SPEAR II
    Zhang, Chen
    Gao, Xiao-Liang
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
  • [5] Security Analysis of the Access Control Solution of NDN Using BAN Logic
    Yuan Fei
    Huibiao Zhu
    Phan Cong Vinh
    [J]. Mobile Networks and Applications, 2020, 25 : 1162 - 1173
  • [6] Security Analysis of the Access Control Solution of NDN Using BAN Logic
    Fei, Yuan
    Zhu, Huibiao
    Phan Cong Vinh
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03): : 1162 - 1173
  • [7] Security analysis of Kerberos protocol based on the strand space model
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    [J]. Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
  • [8] Security Analysis of OIAP Implementation Based on BAN Logic
    Xu Shiwei
    Zhang Huanguo
    Yan Fei
    Xu Mingdi
    Li Zhide
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 144 - +
  • [9] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol
    Nitin, Del
    Chauhan, Durg Singh
    Sehgal, Vivek Kumar
    Mahanot, Ankit
    Singh, Pallavi
    Ahuja, Sohit
    Shrivastava, Utkarsh
    Rana, Manisha
    Punjabi, Vineet
    Vinay, Shivam
    Sharma, Nakul
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +
  • [10] Training Scenario for Security Testing of the Kerberos Protocol
    Lazarov, Willi
    Bohacik, Antonin
    Kohout, David
    Fujdiak, Radek
    [J]. ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 56 - 67