Proceedings of the AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013)

Formal Analysis of the Kerberos Authentication Protocol with PVS

Authors
Guodong Sun, Shenghui Su
Corresponding Author
Guodong Sun
Available Online December 2013.
DOI
https://doi.org/10.2991/wiet-13.2013.46How to use a DOI?
Keywords
Formal methods; Kerberos; Authentication protocol; PVS
Abstract
Formal methods are one of the most important technologies to analyze and design authentication protocols. Kerberos protocol is a famous identity authentication protocol and it is widely used in the network. Although some fruitful formal verifications of the Kerberos protocol have been implemented, there are still little tool-assisted formal analyses. In this paper some important authentication properties of the Kerberos authentication protocol are specified and verified with the help of PVS (Prototype Verification System). According to our analysis, the Kerberos authentication protocol satisfies the mutual authentication between the client and the server, and the client’s identity can also be authenticated.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013)
Part of series
Advances in Intelligent Systems Research
Publication Date
December 2013
ISBN
978-90786-77-95-6
ISSN
1951-6851
DOI
https://doi.org/10.2991/wiet-13.2013.46How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Guodong Sun
AU  - Shenghui Su
PY  - 2013/12
DA  - 2013/12
TI  - Formal Analysis of the Kerberos Authentication Protocol with PVS
BT  - AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013)
PB  - Atlantis Press
SN  - 1951-6851
UR  - https://doi.org/10.2991/wiet-13.2013.46
DO  - https://doi.org/10.2991/wiet-13.2013.46
ID  - Sun2013/12
ER  -