An Improved Kerberos Scheme Based on Dynamic Password

Автор: Wen Lei, Hai Cao, Xingjian Liang, Hong Zhang

Журнал: International Journal of Information Technology and Computer Science(IJITCS) @ijitcs

Статья в выпуске: 2 Vol. 2, 2010 года.

Бесплатный доступ

By studying the Kerberos authentication scheme, an improved authentication scheme is raised, which is based on Dynamic Password Method. In the improved scheme, user’s password can be effectively protected, and the authentication is double between users and severs. Also, the scheme can resist jacking connection attack. The improved scheme is more secure and more practical than the original one.

Identity authentication, dynamic password, security, improvement

Короткий адрес: https://sciup.org/15011588

IDR: 15011588

Список литературы An Improved Kerberos Scheme Based on Dynamic Password

  • B. Clifford Neuman,Theodore Ts'o.Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine,Volume 32, Number 9, pages 33-38, September 1994.
  • John T. Kohl, C. Neuman : The Kerberos Network Authentication Service (V5),RFC 1510, September 1993 Copyright © 2010 MECS I.J. Information Technology and Computer Science, 2010, 2, 33-39 An Improved Kerberos Scheme Based on Dynamic Password 39
  • Neuman C., The Kerberos network authentication Service(v5), RFC 4120, 2005.
  • BELLOVIN SM,MERRITTM., “Limitations of the Kerberos authentication systems”, Journal of ACM SIGCOMM Computer Communication Review,1990, 20 (5) :119-132.
  • Law L,Menezes A,Qu M., “An efficient protocol for authenticated key agreement”, Designs, Codes and Cryptography, 2003,28(2):119-134.
  • Kwon Tackyoung,Park Young-Ho,Lee Hee Jung., “Security Analysis and Improvement of the Efficient Password-Based Authentication Protocol”, IEEE Communications Letters, 2005,9(11):93-95.
  • YAO Gang, FENG Deng-Guo, “Pairwise Key Agreement Protocols Based on the Weil Pairing”, Journal of Software,2006,17(4): 907-914.
  • HU Ying-song, XU peng., “An improved Kerberos algorithm based on the secure remote password and the Public Key algorithm”, Journal of Computer Engineering & Science, 2007,29(5):83-85,134, (in Chinese).
  • WU Zhi-guang ,LU Yin-hua ,WENG Hui-yu, “Analysis of Kerberos Protocols Based on EnvironmentalS ensitive Bisimulation Method”, Journal of Computer Simulation, 2007,24(2): 99-102, (in Chinese).
  • TANG Wei-dong,LI Wei-min, “Improving Kerberos protocol with Diffie-Hellman algorithm”, Journal of Computer Engineering and Design, 2007,28(2):343-345, (in Chinese).
  • LI Ji-yong., “New Kerberos protocol basedon Weil pairing”, Journal of Computer Engineering, 2008, 28(2): 422-423, (in Chinese).
  • Wu Xilan,Shu Yuanzhong,Jiang Zetao,Wu Zhihong, “An Improvement Kerberos Protocal with PKI Technology”, Journal of Computer Applications and Softwar, 2009,26(2):85-87, (in Chinese).
  • CHEN Jia-qi, FENG Jun, HAO Yan, “Improvement of Cross-realm Kerberos with Certificateless Key Agreement Protocol”, Journal of Computer Engineering, 2010,36(20):150-152, (in Chinese).
  • WU Chunxue,LIU Liusheng, “Improving Kerberos system based on the key agreement protocol of identity based cryptography”, Journal of University of Shanghai for Science and Technology, 2010,32(4):365-368, (in Chinese).
  • CHEN Can, LI Jun., “Formal analysis of Kerberos protocol”, Journal of Microelectronics & Computer, 2006,23(6):49-51,55, (in Chinese).
  • HUANG Ye-yu, CHEN Qin., “New dynamic password authentication scheme”, Journal of Computer Engineering and Design, 2005,26(7):1735-1736,1739, (in Chinese).
  • LEI Wen,ZHAO Pan, ZHANG Hong., “Study and improve on a dynamic password authentication scheme”, Journal of Sichuan University of Science& Engineering(Natural Science Edition), 2009,22(5):47-50, (in Chinese).
Еще
Статья научная