Security Analysis of the Kerberos protocol using BAN logic

被引:10
|
作者
Fan, Kai [1 ]
Li, Hui [1 ]
Wang, Yue [2 ]
机构
[1] Xidian Univ, Minist Edu, Key Lab Comp Network & Informat Secur, Xian, Shaanxi, Peoples R China
[2] Xian Branch Shaanxi Telecom Ltd, Xian, Peoples R China
关键词
Kerberos protocol; Formal analysis; BAN Iogic;
D O I
10.1109/IAS.2009.320
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [41] A Network Authentication Protocol Based on Kerberos
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
  • [42] Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal
    Kirsal, Y.
    Gemikonakli, O.
    [J]. PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 153 - +
  • [43] Synopsis of Security: Using Kerberos Method to Secure File Transfer Sessions
    Al-Ayed, Fadi
    Liu, Hang
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1016 - 1020
  • [44] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [45] Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif
    You, Ilsun
    Kim, Jiyoon
    Pawana, I Wayan Adi Juliawan
    Ko, Yongho
    [J]. Applied Sciences (Switzerland), 2024, 14 (21):
  • [46] Security Proof of KerNeeS Protocol Based on Logic of Events
    Yang, Ke
    Xiao, Meihua
    Chen, Jia
    [J]. THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 61 - 79
  • [47] Security of Data Transmission Using Logic Gates and Crypt Analysis
    Rastogi, Rohit
    Mishra, Rishabh
    Sharma, Sanyukta
    Nigam, Anshika
    Arya, Pratyush
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 101 - 105
  • [48] An approach for network security analysis using logic exploitation graph
    Mao, Han-dong
    Zhang, Wei-Ming
    Feng, Chen
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 761 - +
  • [49] A logic programming based framework for security protocol verification
    Wang, Shujing
    Zhang, Yan
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2008, 4994 : 638 - 643
  • [50] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
    Anakath, A. S.
    Ambika, S.
    Rajakumar, S.
    Kannadasan, R.
    Kumar, K. S. Sendhil
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (02): : 833 - 847