Title :
Analyzing and verifying Petri net model of security protocol based on Maria
Author :
Wang, Yan ; Zhou, Jiantao ; Li, Hua ; Ying Hao
Author_Institution :
Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China
Abstract :
Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT-26 protocol has a security flaw. So we improve the model according to PKINIT-27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol.
Keywords :
Petri nets; formal specification; formal verification; message authentication; protocols; Maria tool; PKINIT-26 protocol; PKINIT-27 specification; Petri net model; authentication service exchange; formal specification; network security; public-key Kerberos protocol; security protocol analysis; Computational modeling; Logic gates; Protocols; Public key; Servers; Maria; Petri net; analysis and verification; security protocol;
Conference_Titel :
Computer Application and System Modeling (ICCASM), 2010 International Conference on
Print_ISBN :
978-1-4244-7235-2
Electronic_ISBN :
978-1-4244-7237-6
DOI :
10.1109/ICCASM.2010.5620733