Distributed authentication in Kerberos using public key cryptography

被引:17
|
作者
Sirbu, MA
Chuang, JCI
机构
关键词
D O I
10.1109/NDSS.1997.579231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.
引用
收藏
页码:134 / 141
页数:2
相关论文
共 50 条
  • [1] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [2] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [3] An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography
    Wang Juan
    Cao Man-cheng
    Fang Yuan-kang
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 489 - 496
  • [4] Two Factor Authentication Using Visual Cryptography and Digital Envelope in Kerberos
    Khandelwal, Naman S.
    Kamboj, Pariza
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [5] Design choices for public key based Kerberos authentication system
    Varadharajan, V
    Mu, Y
    Hitchens, M
    PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 539 - 550
  • [6] Performance of public-key-enabled Kerberos authentication in large networks
    Harbitter, AH
    Menascé, DA
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 170 - 183
  • [7] Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
    Dey, Shreya
    Hossain, Ashraf
    IEEE SENSORS LETTERS, 2019, 3 (04)
  • [8] PKI-SC: Public Key Infrastructure using Symmetric Key Cryptography for Authentication in VANETs
    Sakhreliya, Sumegha C.
    Pandya, Neha H.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 186 - 191
  • [9] An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1577 - 1582
  • [10] AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS
    Gharib, Hadj
    Belloulata, Kamel
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2014, 8 (22): : 12 - 18