期刊文献+

网络和分布式系统中的认证 被引量:15

AUTHENTICATION IN NETWORK AND DISTRIBUTED SYSTEMS
下载PDF
导出
摘要 文中在Kerberos认证协议的基础上,采用Yaksha体制,提出了一个公钥密码交互式认证体制.体制中由用户产生的时戳代替一次性随机数解决时间同步问题,以联网初始化协议代替键入口令,从而克服了Kerberos的某些局限性,可安全可靠、高速地通信.本体制可有效地防止口令猜测和重放攻击,并简化了密钥管理和存储. Based on Kerberos protocol,a novel authentication system is presented using Yaksha security system,which overcomes several limitations of Kerberos.In this system the public key cryptosystem is used to authenticate and exchange session keys mutually.In addition,timestamps produced by the user,instead of nonces,are employed to solve the problem of time synchronization,and password scheme is replaced by initialization protocol.High security and speed can be obtained,guessing password attack and replay attack can be prevented effectively ,and the problem of key management and storage is simplified.
出处 《计算机研究与发展》 EI CSCD 北大核心 1998年第10期865-868,共4页 Journal of Computer Research and Development
基金 国家自然科学基金 "九五"军事通信预研基金
关键词 Yaksha体制 计算机网络 分布计算机 认证 network,distributed system,authentication protocol,Kerberos,Yaksha system
  • 相关文献

同被引文献35

  • 1朱贤,邢光林,洪帆.分布式环境下的访问控制综述[J].微型机与应用,2005,24(1):4-7. 被引量:4
  • 2ITU-T. Draft revised ITU-T Recommendation X. 509. ISO/IEC 9594-8: Information Technology-Open Systems Interconnection-The Directory: Public-Key and Attribute Certificate Frameworks [EB/OL]. ftp:∥ftp. hull. com/pub/OSIdirectory/4thEditionTexts/X. 509_ 4thEditionDraftV2. pdf,2000-05.
  • 3R Housley, W Ford, W Polk, et al. Internet X. 509 Public Key Infrastructure Certificate and CRL Profile[R]. Internet RFC 2459, 1999.
  • 4P Sylvester, M Zolotarev, Rzuccerato. Internet X. 509 Public Key Infrastructure Data Validation and Certification Server Protocols[Z]. Network Working Group, 2001.
  • 5Nash A.PKI Implementing and Managing E-Security.RSA Press, 2002.
  • 6TanenbaumAS.计算机网络(第三版)[M].北京:清华大学出版社,1996..
  • 7WilliamStallings.密码编码学与网络安全:原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 8BruceSchneier.应用密码学:协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 9王锐,陈靓,周刚等.网络最高技术指南[M].北京:机械出版社,2001.
  • 10沈强.代理服务器技术[J].计算机应用,1999,(4):67-68.

引证文献15

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部