期刊文献+

利用Diffie-Hellman算法改进Kerberos协议 被引量:8

Improving Kerberos protocol with Diffie-Hellman algorithm
下载PDF
导出
摘要 针对Kerberos认证协议由对称算法所带来的局限性,国内外已有很多人用以RSA算法为代表的公钥体制对Kerberos协议进行了改进,但美中不足的是Kerberos本身可以窃听客户和服务器之间的会话而不被举证。选用Diffie-Hellman算法来修正Kerberos协议,不仅继承了先行者们的研究成果,而且彻底解决Kerberos可能窃听通信双方会话的问题。因此更具安全性、实用性。 To overcome the Kerberos' limitations caused by using symmetric algorithm, many people home and abroad have improved Kerberos protocol with public-key algorithm represented by RSA, a blemish in an otherwise perfect thing is that Kerberos itself may bug session between client and server, yet can't be put to the proof. This paper combines Diffie-Hellman algorithm, with the purpose to not only inheriting attained research achievements, but also completely solving the problem of that Kerberos can intercept and see the information from two communicating sides with session key. In comparison with Kerberos RSA, it provides even more secure and practical.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第2期343-345,共3页 Computer Engineering and Design
关键词 Kerbems Diffie—Hellman算法 身份认证 DES RSA 非否认机制 Kerberos Diffie-Hellmanalgorithm identity authentication DES RSA non-repudiation
  • 相关文献

参考文献9

二级参考文献51

  • 1W Stallings, Network Security Essentials ; Applications and Stadards ,Prentice - Hall ,inc, 2000.
  • 2S M Bellovin, M Merritt, Limitations of the kerberos authentication system. In Proceedings of the Winter 1991 Usenix Conference, 1991.
  • 3G Gaskell, M Looi. Integrating Smart Cards into Authentication Systems. Berlin:Advances in Cryptology - EUROCRYPT'1995 Proceeding, 1995.
  • 4G Horng, C S Yang, Key authentication scheme for cryptosystems based on discrete logarithms. Computer Communications, 1996, (19) :848-850.
  • 5W Stallings,Network Security Essentials;Applications and Stadards,Prentice-Hall,inc.2000
  • 6S M Bellovin,M Merritt.Limitations of the kerberos authentication system.In Proceedings of the Winter 1991 Usenix Conference,1991
  • 7G Gaskell,M Looi.Integrating Smart Cards into Authentication Systems.Berlin:Advances in Cryptology-EUROCRYPT`1995 Proceeding,1995
  • 8G Horng,C S Yang.Key authentication scheme for cryptosystems based on discrete logarithms.Computer Communications,1996,(19):848-850
  • 9Gaskell. G I. Integrating Smart Cards into Kerberos . http:∥citeseer.nj.nec.com/cache/papers/cs/23304/http:zSzzSzwww. users.bigpond.comzSzg.gaskellzSzthesis.pdf/integrating-smart-cards-into.pdf,2002-02
  • 10Steiner J G, Neuman B C, Schiller J I. Kerberos: An Authentication Service for Open Network Systems. USENIX Conference Proceedings, 1988-02:191-202

共引文献52

同被引文献44

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部