Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier

  • Punit Mundra
  • Madhavi Sharma
  • Shobhit Shukla
  • Sanjay Singh
Part of the Communications in Computer and Information Science book series (CCIS, volume 204)

Abstract

In open distributed environment several users accesses the network resources on server, server will allow only authenticated users to access these resources. So it has become of prime importance for nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Various authentication protocols is used for the this purpose, Kerberos protocol is one of them. Several versions of the protocol exist. The aim of this paper is modeling and verification of the Inter Realm Authentication and User to User Authentication in Kerberos protocol through NuSMV model checker. It also demonstrate that when presence of intruder in the system, and make use of service, it will generate the counter example.

Keywords

Model Checker Authentication Protocol Authentication Server Computation Tree Logic Protocol Execution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Miller, S.P., Neumann, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system (October 1988), http://web.mit.edu/Saltzer/www/publications/athenaplan/e.2.1.pdf
  2. 2.
    Huth, M., Ryan, M.: Logic In computer Science. Cambridge University Press, Cambridge (2004)CrossRefMATHGoogle Scholar
  3. 3.
    Panti, M., Spalazzi, L., Tacconi, S.: Using the nusmv model checker to verify the kerberos protocol (2007), http://www.inform.unian.it/personale/spalazzi/repo
  4. 4.
    Adyanthaya, S., Rukmangada, S., Tiwari, A., Singh, S.: Modeling freshness concept to overcome replay attack in kerberos protocol using nusmv. In: 2010 International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, pp. 125–129 (September 2010)Google Scholar
  5. 5.
    Cavada, R., Cimatti, A., Jochim, C.A., Keighren, G., Olivetti, E., Pistore, M., Roveri, M., Tchaltsev, A.: Nusmv 2.4 user manual (2005), http://nusmv.fbk.eu/NuSMV/userman/v24/nusmv.pdf
  6. 6.
    Nusmv 2.4 (2011), http://nusmv.fbk.eu/
  7. 7.
    Cimatti, A., Clarke, E.M., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: Nusmv 2: An opensource tool for symbolic model checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 268–359. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Edmund, O.G., Clarke, M., Peled, D.A.: Model Checking. MIT-PRESS, Cambridge (1999)Google Scholar
  9. 9.
    Stallings, W.: Cryptography and Network Security Principles and Practices, 5th edn. Prentice Hall, New Delhi (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Punit Mundra
    • 1
  • Madhavi Sharma
    • 1
  • Shobhit Shukla
    • 1
  • Sanjay Singh
    • 1
  1. 1.Department of Information and Communication Technology, Manipal Institute of TechnologyManipal UniversityManipalIndia

Personalised recommendations