DocumentCode :
3593990
Title :
Analyzing and verifying Petri net model of security protocol based on Maria
Author :
Wang, Yan ; Zhou, Jiantao ; Li, Hua ; Ying Hao
Author_Institution :
Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China
Volume :
2
fYear :
2010
Abstract :
Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT-26 protocol has a security flaw. So we improve the model according to PKINIT-27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol.
Keywords :
Petri nets; formal specification; formal verification; message authentication; protocols; Maria tool; PKINIT-26 protocol; PKINIT-27 specification; Petri net model; authentication service exchange; formal specification; network security; public-key Kerberos protocol; security protocol analysis; Computational modeling; Logic gates; Protocols; Public key; Servers; Maria; Petri net; analysis and verification; security protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Application and System Modeling (ICCASM), 2010 International Conference on
Print_ISBN :
978-1-4244-7235-2
Electronic_ISBN :
978-1-4244-7237-6
Type :
conf
DOI :
10.1109/ICCASM.2010.5620733
Filename :
5620733
Link To Document :
بازگشت