Study on a Secure Authentication and Authorization Protocol based on Kerberos 


Vol. 29,  No. 5, pp. 737-749, May  2004


PDF
  Abstract

Kerberos authenticates clients using symmetric-key cryptography, and supposed to trust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege se π er to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed every time using MAC(message authentication c α Ie) algorithm with the long-tenn key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

E. Kim, M. Kim, M. Jun, "Study on a Secure Authentication and Authorization Protocol based on Kerberos," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 5, pp. 737-749, 2004. DOI: .

[ACM Style]

Eun-hwan Kim, Myung-hee Kim, and Moon-seog Jun. 2004. Study on a Secure Authentication and Authorization Protocol based on Kerberos. The Journal of Korean Institute of Communications and Information Sciences, 29, 5, (2004), 737-749. DOI: .

[KICS Style]

Eun-hwan Kim, Myung-hee Kim, Moon-seog Jun, "Study on a Secure Authentication and Authorization Protocol based on Kerberos," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 5, pp. 737-749, 5. 2004.