期刊文献+

利用Kerberos改进无线传输层的设计

Improving the WTLS agreement by means of Kerberos
下载PDF
导出
摘要 在分析WAP协议族中的无线传输层(WTLS)协议后,指出了其中的匿名认证过程存在中间人攻击的风险。本文将Kerberos认证系统加入到WTLS协议中改进了WTLS协议的安全性,详细设计了该解决方案中涉及的数据结构,并给出了一个该方案的仿真模型,讨论了仿真参数的合理设置。 Analysis of the WAP protocol suite of the Wireless Transport Layer Security (WTLS) agreement, reveals that the certification process in the handshake agreement presents a risk of intermediary anonymous attack that we denote man-in-the-middle-attack. This article presents a way to mitigate this risk by addition of a Kerberos authentication system to the WTLS agreement in order to improve the security of the latter. At the same time, the article gives a detailed description of the solutions involved in the data structure, a simulation model of the program, and discusses reasonable values for the simulation parameters.
出处 《北京化工大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第1期93-96,共4页 Journal of Beijing University of Chemical Technology(Natural Science Edition)
关键词 WAP WTLS KERBEROS 公钥密码算法 WAP WTLS Kerberos public key encryption
  • 相关文献

参考文献8

二级参考文献27

  • 1文铁华,谷士文.增强Kerberos协议安全性的改进方案[J].通信学报,2004,25(6):76-79. 被引量:24
  • 2Tung B et al.Public Key Cryptography for Cross-Realm Authentication in Kerberos, 2002-05. 被引量:1
  • 3Harbitter A ,Menasce D.Performance of Public-Key-Enabled Kerberos Authentication in LargeNetworks[C].In : 2001 IEEE Symposium on Security and Privacy Proceedings, IEEE Computer Society Press, 2001. 被引量:1
  • 4Sirbu M,Chung-I,Chuang J.Distributed Authentication in Kerberos Using Public Key Cryptography[C].In:Symposium on Network and Distributed System Security, San Diego, California : IEEE Computer Society Press, 1997. 被引量:1
  • 5M Sirbu,J C Chuang.Public key Based Ticket Granting Service in Kerberos.Internet Draft, 1996-05. 被引量:1
  • 6R Lichota,G Hammonds,S Brackin.Verifying Cryptographic Protocols for Electronic Commerce[C] In:2nd USENIX Workshop on Electrnic Commerce, 1996-11. 被引量:1
  • 7Ian Downnard.Public-key crytography extensions into Kerberos.IEEE POTENTIALS, 2003-01. 被引量:1
  • 8B C Neuman,T Ts'o.Kerberos:An Authentication Service for Computer Networks[J],IEEE Communications, 1994;32 (9) : 33-38. 被引量:1
  • 9Tung B et al.Public Key Cryptography for Initial Authenticationin Kerberos, 2002-03. 被引量:1
  • 10[1]ANSI X9.52 Triple Data Encryption Alorithm Modes of Operation[S].American Bankers Association,1998 被引量:1

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部