DocumentCode :
421062
Title :
Provably secure entity authentication the three party case
Author :
Allam, Ali M. ; Ibrahim, Ibraliim I. ; ALi, Ihab A. ; Elsawy, A.E.H.
Author_Institution :
Fac. of Eng., Helwan Univ., Cairo, Egypt
Volume :
1
fYear :
2004
fDate :
28 June-1 July 2004
Firstpage :
381
Abstract :
In an open network-computing environment, a workstation cannot be trusted to identify its users correctly to network services. Authentication protocols provide an approach for the receiver of a message to ascertain its origin and to verify the identity of the sender in a distributed environment. However, most of the protocols have suffered from several kinds of attacks. Therefore, it is necessary to verify authentication protocols deliberately with such attacks as a basis. This work presents a new cryptographic protocol for an open network-computing environment. It describes the weaknesses and limitations in Kerberos protocol and shows how the new protocol overcomes these weaknesses and limitations. We also demonstrate how the new protocol provides an additional service, privacy, beside the authentication service in less number of messages than the previous authentication protocols.
Keywords :
computer network management; cryptography; message authentication; protocols; telecommunication security; Kerberos protocol; authentication protocol; cryptographic protocol; distributed environment; open network-computing environment; Authentication; Computer aided software engineering; Computer crime; Cryptographic protocols; Cryptography; Privacy; Public key; Resists; Taxonomy; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on
Print_ISBN :
0-7803-8623-X
Type :
conf
DOI :
10.1109/ISCC.2004.1358434
Filename :
1358434
Link To Document :
بازگشت