[go: up one dir, main page]

You et al., 2012 - Google Patents

Improved authentication model based on kerberos protocol

You et al., 2012

Document ID
16998313003101254468
Author
You X
Zhang L
Publication year
Publication venue
Advances in Multimedia, Software Engineering and Computing Vol. 1: Proceedings of the 2011 MSEC International Conference on Multimedia, Software Engineering and Computing, November 26–27, Wuhan, China

External Links

Snippet

An improved authentication model was suggested in this paper. Based on the analysis of the basic principle and security of Kerberos protocol, the lightweight level ticket was used in the improved model and the disadvantages of Kerberos protocol were well settled by using …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
CN100546245C (en) Network authentication and key distribution method across security domains
US10243742B2 (en) Method and system for accessing a device by a user
CN107257334B (en) Identity authentication method for Hadoop cluster
CN100580657C (en) Distributed single sign-on service
US8281136B2 (en) Techniques for key distribution for use in encrypted communications
CN101159556B (en) Key Management Method in Shared Encrypted File System Based on Group Key Server
CN106341232B (en) A password-based anonymous entity authentication method
CN101834853B (en) Method and system for sharing anonymous resource
Al-Janabi et al. Public-key cryptography enabled kerberos authentication
CN102098317A (en) Data transmitting method and system applied to cloud system
CA2551113A1 (en) Authentication system for networked computer applications
CN103490881A (en) Authentication service system, user authentication method, and authentication information processing method and system
US8392703B2 (en) Electronic signature verification method implemented by secret key infrastructure
CN114513339A (en) A security authentication method, system and device
CN115987502A (en) A quantum communication identity authentication method and system for power grid dispatching business
CN108574576A (en) Cross-cloud authentication method based on Kerberos system
CN111917543A (en) User access cloud platform security access authentication system and application method thereof
CN107248997B (en) Authentication method based on smart card in multi-server environment
CN116707854A (en) A Robust Attribute-Based Encryption Access Control Method for Cloud Storage
JP4499575B2 (en) Network security method and network security system
CN113556236B (en) Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature
You et al. Improved authentication model based on kerberos protocol
CN112035820B (en) Data analysis method used in Kerberos encryption environment
JP2005086428A (en) Method for performing encrypted communication with authentication, authentication system and method
Narwal et al. Kerberos protocol: A review