Training Scenario for Security Testing of the Kerberos Protocol.
Willi LazarovAntonin BohacikDavid KohoutRadek FujdiakPublished in: IEA/AIE (2024)
Keyphrases
- authentication protocol
- mutual authentication
- security analysis
- security protocols
- key distribution
- trusted third party
- smart card
- cryptographic protocols
- key agreement protocol
- secret key
- rfid tags
- lightweight
- security requirements
- test set
- public key cryptosystem
- security properties
- testing phase
- privacy protection
- key exchange protocol
- authentication mechanism
- user authentication
- diffie hellman
- password authentication
- security model
- training stage
- access control
- rfid systems
- key management
- training set
- training phase
- authentication scheme
- low cost
- key agreement
- test cases
- information security
- mobile payment
- provably secure
- training process
- third party
- statistical databases
- intrusion detection
- public key
- security services
- key establishment
- homomorphic encryption
- communication protocols
- virtual private network
- secure routing
- sensitive data