Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
Authors
Abstract
Recently a Distributed Temporal Protocol Logic has been devised to capture reasoning in the
distributed environment of security protocols. Elsewhere we have constructed a proof-based verification
framework using distributed temporal protocol logic to verify the authentication property of security
protocols. In this paper, we apply our verification framework to a well-known protocol. In particular, we
analyze the authentication property of the public-key extension of Kerberos-5 protocol. We demonstrate how
we are able to identify a subtle design flaw in the protocol. This results into showing the applicability of our
framework as well as demonstrating the ease with which distributed temporal protocol logic can be used to
analyze authentication protocols.