3 research outputs found

    Extending the Strand Space Method with Timestamps: Part I the Theor

    Get PDF
    In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and com-bine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model protocol mixture. The main idea is to introduce a new relation a to model the causal relation between one primary protocol session and one of its following secondary protocol session. Accordingly, we also extend the definition of unsolicited authen-tication test

    Generalized Unsolicited Tests for Authentication Protocol Analysis

    Full text link

    the inductive approach to strand space

    No full text
    IFIP Working Grp 6 1Strand space is a promising technique developed by Guttman et al. from MITRE company, and it provides us an intuitive and clear framework to analyze security protocols, but its mechanics of the proof tend to be quite intricate and not necessa
    corecore