Abstract
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed. The analysis shows that the improvement proposal can overcome some defects in the original Kerberos intra-domain authentication protocol, such as the key escrow problem and network intermediaries attack, etc. Moreover, the improvement also meets the demand of security proposed by key agreement protocol, which has a certain security and perspective of application in the process of network identity authentication.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos:An Authentication Service for Open Network Systems. In: USENIX Conference Proceedings, pp. 191–202 (February 1988)
Bellovin, S.M., Merritt, M.: Limitations of the Kerberos Protocol. In: Winter 1991, USENIX Conference Proceedings, pp. 253–267. USENIX Asociation (1991)
Ganesan, R.: Yaksha: augmenting Kerberos with the public key cryptography. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 132–143. IEEE Computer Society Press (1995)
Liu, K.-L., Qing, S.-H., Meng, Y.: An Improved Way on Kerberos Protocol Based on Public-Key Algorithms. Journal of Software (6), 872–877 (2001)
Mo, Y., Zhang, Y.-Q., Li, X.: Study of the Attacks on Kerberos Protocol and Countermeasures. Computer Engineering 31(10), 66–69 (2005)
Tian, J.-F., Bi, Z.-M., Zhang, J.: An Improved Way on Kerberos Protocol Based on Public-Key Algorithms. Microelectronics & Computer 25(9), 161–164 (2008)
Zhou, T., Wang, J.-Y., Li, M.-J., Li, Z.-J.: Analysis and Comparison of the Kerberos Protocol’s Versions. Computer Science 36(2), 119–128 (2009)
Tang, W.-D., Li, W.-M., Zhou, Y.-Q.: Improving Kerberos protocol with ElGamal algorithm. Computer Engineering and Design 27(11), 2063–2065 (2006)
Hu, Y., Wang, S.-L.: Research on Kerberos identity authentication protocol based on hybrid system. Journal of Computer Applications, 1659–1661 (June 2009)
Al-Riyami, S.S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Blake Wilson, S., Johnson, D., Menezes, A.: Key agreemen tp rotocols and their security analysis. In: Proc. of the 6 th IMA Inter2national Conference on Cryptography and Coding, p. 30245. Springer, Heidelberg (1997)
Liu, W.-H., Xu, C.-X.: Certificateless two-party key agreement scheme without bilinear pairing. Application Research of Computers 27(11), 4287–4292 (2010)
Lippold, G., Boyd, C., Gonzalez Nieto, J.: Strongly Secure Certificateless Key Agreement. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 206–230. Springer, Heidelberg (2009)
Zhang, L., Zhang, F.-T.: A Method to Construct a Class of Certificateless Signature Schemes. Chinese Journal of Computer 32(5), 940–945 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Juan, W., Man-cheng, C., Yuan-kang, F. (2011). An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography. In: Jin, D., Lin, S. (eds) Advances in Multimedia, Software Engineering and Computing Vol.2. Advances in Intelligent and Soft Computing, vol 129. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25986-9_77
Download citation
DOI: https://doi.org/10.1007/978-3-642-25986-9_77
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25985-2
Online ISBN: 978-3-642-25986-9
eBook Packages: EngineeringEngineering (R0)