Intrusion Detection in Zero Knowledge System Using Model Checking Approach

Jacob, Teslin and Raman, Mithuna and Singh, Sanjay (2012) Intrusion Detection in Zero Knowledge System Using Model Checking Approach. In: LNEE Proceedings of NETCOM 2012, India.

[img] PDF
07.pdf - Published Version
Restricted to Registered users only

Download (353kB) | Request a copy


The number of services provided to the modern users of to- days' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much di�culty. The Zero Knowledge protocol provides authentication without the need to send any private and con�dential information across the network. Only mathematical computations on these con�dential in- formation have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the vari- ous states that a prover (sender) and a veri�er (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system.

Item Type: Conference or Workshop Item (Paper)
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 02 Mar 2013 10:44
Last Modified: 02 Mar 2013 10:44

Actions (login required)

View Item View Item