期刊文献+

基于公钥的Kerberos分布式认证方法研究 被引量:5

Public-Key Based Kerberos in Distributed Authentication
下载PDF
导出
摘要 文章描述了在Kerberos票据框架中,应用公钥密码体制实现分布式认证的三种方法。分析了三种协议(PKINIT,PKCROSS和PKDA)的不同安全认证过程,找出了它们基于公钥的“把繁重的分布式认证工作分配到通信各方”的共性,实现了一个较Kerberosv5使用范围更广、安全性更强的方法。同时,客户方的隐私一样得到了保护,从而,补充扩展了基于公钥的Kerberos安全认证。 In this work we describe three methods for fully distributed authentication using public key cryptography within the Kerberos ticket framework.By analysing the protocols of PKINIT,PKCROSS and PKDA based on public-key cryptography,we find a way to enhance secerity and scalability in distributed realm as compared to Kerberos V5 by distributing most of the authentication workload away from the trusted intermediary and to the communicating parties. Privacy of Kerberos clients is also enhanced.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第4期121-124,共4页 Computer Engineering and Applications
基金 国家973基础研究规划资助项目(编号:G20000263)
关键词 Kerberos分布式 密钥分配中心 公钥加密算法 扩展 Kerberos,distribution PDC,public key-based,extension
  • 相关文献

参考文献8

  • 1Ian Downnard.Public-key crytography extensions into Kerberos.IEEE POTENTIALS, 2003-01. 被引量:1
  • 2B C Neuman,T Ts'o.Kerberos:An Authentication Service for Computer Networks[J],IEEE Communications, 1994;32 (9) : 33-38. 被引量:1
  • 3Tung B et al.Public Key Cryptography for Initial Authenticationin Kerberos, 2002-03. 被引量:1
  • 4Tung B et al.Public Key Cryptography for Cross-Realm Authentication in Kerberos, 2002-05. 被引量:1
  • 5Harbitter A ,Menasce D.Performance of Public-Key-Enabled Kerberos Authentication in LargeNetworks[C].In : 2001 IEEE Symposium on Security and Privacy Proceedings, IEEE Computer Society Press, 2001. 被引量:1
  • 6Sirbu M,Chung-I,Chuang J.Distributed Authentication in Kerberos Using Public Key Cryptography[C].In:Symposium on Network and Distributed System Security, San Diego, California : IEEE Computer Society Press, 1997. 被引量:1
  • 7M Sirbu,J C Chuang.Public key Based Ticket Granting Service in Kerberos.Internet Draft, 1996-05. 被引量:1
  • 8R Lichota,G Hammonds,S Brackin.Verifying Cryptographic Protocols for Electronic Commerce[C] In:2nd USENIX Workshop on Electrnic Commerce, 1996-11. 被引量:1

同被引文献17

  • 1任军.基于LDAP的目录服务综述[J].计算机应用研究,2005,22(5):8-10. 被引量:42
  • 2莫燕,张玉清.对Kerberos协议的攻击及对策研究[C]//全国网络与计算机信息安全讨论会论文集.北京,2004:148-153. 被引量:1
  • 3Liu S Q, Meng L F. Research and implement of grid security authentication model based on globus[C]//中国通信协会第五届学术年会论文集.南京,2008:259-262. 被引量:1
  • 4Woller K, Kleinwort T, Jung P. After the first five years central linux support at DESY[C]//Proceedings of International Conference on Computing in High Energy and Nuclear Physics. Beijing, 2001 : 75 - 78. 被引量:1
  • 5Neuman B C, Ts'o T. Kerberos:An Authentication Service for Computer Networks[J]. IEEE Communications, 1994, 32(9):33-38. 被引量:1
  • 6KOHL J.The Kerberos network authentication service (V5), C. Neuman, Editor. 1993 :http://www.ietf.org/rfc/rfe 1510. txt?number= 1510. 被引量:1
  • 7ASHELY P, BROOM B.A survey of securemulti-domain distributed architectures, Queensland University of Technology, Faculty of Information Technology. 1997. 被引量:1
  • 8BASSHAM L E.Efficiency testing of ANSIC implementations of round 1 candidate algorithms for the advanced encryption standard, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. 1999. 被引量:1
  • 9HARBITTER A, MENASCE D.Performance of public- key- enabled Kerberos authentication in largenetworks[C].2001 IEEE Symposium on Security and Privacy Proceedings, IEEE Computer Society Press, 2001. 被引量:1
  • 10lan Downnard. Public-key crytography extensions into Kerben[J]. IEEE POTENTIALS,2003 (1). 被引量:1

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部