Casper files for the Kerberos Protocol
This directory contains Casper input files for the Kerberos Protocol
from [MNSS87].
- First version is as in the original;
checking is a little slow because of the complexity of the second message.
- Second version splits the second message
into two, and is considerably faster.
Both versions find the attack from [BM90], whereby the intruder replays the
messages from the initiator to the responder to make the responder think that
the initiator is trying to set up a second session.
References:
[BM90]
S. M. Bellovin and M. Merritt.
Limitations of the Kerberos authentication system.
ACM Computer Communications Review, 20(5):119--132, 1990.
[MNSS87] S. P. Miller, C. Neumann, J. I. Schiller, and J. H. Saltzer.
Kerberos authentication and authorization system. Project Athena Technical
Plan Section E.2.1, MIT, 1987. Available here