Casper files for the Kerberos Protocol


This directory contains Casper input files for the Kerberos Protocol from [MNSS87]. Both versions find the attack from [BM90], whereby the intruder replays the messages from the initiator to the responder to make the responder think that the initiator is trying to set up a second session.

References:

[BM90] S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. ACM Computer Communications Review, 20(5):119--132, 1990.

[MNSS87] S. P. Miller, C. Neumann, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. Project Athena Technical Plan Section E.2.1, MIT, 1987. Available here