Distributed authentication in Kerberos using public key cryptography

被引:17
|
作者
Sirbu, MA
Chuang, JCI
机构
关键词
D O I
10.1109/NDSS.1997.579231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.
引用
收藏
页码:134 / 141
页数:2
相关论文
共 50 条
  • [31] Public key cryptography
    Garfinkel, SL
    COMPUTER, 1996, 29 (06) : 101 - 104
  • [32] An integrated user authentication and access control scheme without public key cryptography
    Chien, HY
    Jan, JK
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 137 - 143
  • [33] PUBLIC KEY CRYPTOGRAPHY
    SMITH, J
    BYTE, 1983, 8 (01): : 198 - &
  • [34] Elliptical Curve Cryptography-Kerberos Authentication Model for Keystone in Open Stack
    Shamugam, Veeramani
    Murray, Iain
    Sidhu, Amandeep S.
    MODELING, DESIGN AND SIMULATION OF SYSTEMS, ASIASIM 2017, PT II, 2017, 752 : 633 - 644
  • [35] Using the Logistic Coupled Map for Public Key Cryptography under a Distributed Dynamics Encryption Scheme
    Solis-Sanchez, Hugo
    Barrantes, E. Gabriela
    INFORMATION, 2018, 9 (07)
  • [36] Authentication using cryptography
    Mitchell, Chris
    Information Security Technical Report, 1997, 2 (02): : 25 - 32
  • [37] Breaking and fixing public-key Kerberos
    Cervesato, Iliano
    Jaggard, Aaron D.
    Scedrov, Andre
    Tsay, Joe-Kai
    Walstad, Christopher
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 402 - 424
  • [38] Breaking and fixing public-key Kerberos
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    Walstad, C.
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
  • [39] Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    Wang, Huaqun
    COMPUTER NETWORKS, 2017, 128 : 154 - 163
  • [40] Enhancing Distributed Web Security Based on Kerberos Authentication Service
    Cao Lai-Cheng
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 171 - 178