Journal of Information Security

Volume 1, Issue 2 (October 2010)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Extending the Strand Space Method with Timestamps: Part I the Theory

HTML  Download Download as PDF (Size: 627KB)  PP. 45-55  
DOI: 10.4236/jis.2010.12006    5,247 Downloads   9,204 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model protocol mixture. The main idea is to introduce a new relation to model the causal relation between one primary protocol session and one of its following secondary protocol session. Accordingly, we also extend the definition of unsolicited authentication test.

Share and Cite:

Li, Y. and Pang, J. (2010) Extending the Strand Space Method with Timestamps: Part I the Theory. Journal of Information Security, 1, 45-55. doi: 10.4236/jis.2010.12006.

Cited by

[1] Formal Verification of Secrecy in Group Key Protocols Using Event-B
Int'l J. of Communications, Network and System Sciences, 2012
[2] Secure time information in the internet key exchange protocol
Annales UMCS, Informatica, 2011

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.