Extending the Strand Space Method with Timestamps: Part I the Theory

HTML  Download Download as PDF (Size: 627KB)  PP. 45-55  
DOI: 10.4236/jis.2010.12006    5,245 Downloads   9,193 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model protocol mixture. The main idea is to introduce a new relation to model the causal relation between one primary protocol session and one of its following secondary protocol session. Accordingly, we also extend the definition of unsolicited authentication test.

Share and Cite:

Y. Li and J. Pang, "Extending the Strand Space Method with Timestamps: Part I the Theory," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 45-55. doi: 10.4236/jis.2010.12006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.