Distributed authentication in Kerberos using public key cryptography

被引:17
|
作者
Sirbu, MA
Chuang, JCI
机构
关键词
D O I
10.1109/NDSS.1997.579231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.
引用
收藏
页码:134 / 141
页数:2
相关论文
共 50 条
  • [21] Distributed Public-Key Cryptography from Weak Secrets
    Abdalla, Michel
    Boyen, Xavier
    Chevalier, Celine
    Pointcheval, David
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 139 - +
  • [22] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Luo, Ming
    Zhao, Hong
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (02) : 779 - 798
  • [23] An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
    Ming Luo
    Hong Zhao
    Wireless Personal Communications, 2015, 81 : 779 - 798
  • [24] Using Decision Problems in Public Key Cryptography
    Shipilrain, Vladimir
    Zapata, Gabriel
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 33 - 49
  • [25] DS-AKA-A Novel Secured Authentication Protocol for LTE-A Using Public Key Cryptography
    Prasad, M.
    Manoharan, R.
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 753 - 763
  • [26] Public key cryptography using sphere and spheroid
    Singh, K. John
    Gagneja, Kunal
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (03) : 363 - 383
  • [27] Using decision problems in public key cryptography
    GROUP-BASED CRYPTOGRAPHY, 2008, : 77 - 93
  • [28] Novel Authentication Algorithm - Public Key Based Cryptography in Mobile Phone Systems
    Godor, Gyozo
    Imre, Sandor
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 126 - 134
  • [29] Study of Public Key Cryptography Techniques for Authentication in Embedded Devices for Smart Grids
    Zavala-Diaz, Jonathan
    Reyes-Archundia, Enrique
    Olivares-Rojas, Juan C.
    Chavez-Baez, Marco, V
    Gutierrez-Gnecchi, Jose A.
    Mendez-Patino, Arturo
    PROCEEDINGS OF THE 2021 XXIII IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC 2021), 2021,
  • [30] Secure Session Key Sharing Using Public Key Cryptography
    Gupta, Anjali
    Hussain, Muzzammil
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 573 - 576