Intrusion Detection in Zero Knowledge System Using Model Checking Approach

Teslin Jacob, Mithun Raman, Sanjay Singh
  • January 2013, Springer Science + Business Media
  • DOI: 10.1007/978-1-4614-6154-8_45

Model Checking Zero Knowledge System

What is it about?

The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible.

Why is it important?

Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system.

Read Publication

http://dx.doi.org/10.1007/978-1-4614-6154-8_45

The following have contributed to this page: Sanjay Singh