Abstract

Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authenticati

Highlights

  • There are an explosive growth in a variety of collaborative group services in academia and industry for the past ten years [18]

  • While giving the design and security of the new authentication technique, we mainly focus on the study of its performance compared to PKCROSS and PKTAPP in this paper

  • In this paper we presented a throughout performance evaluation of PKCROSS and PKTAPP in terms of computational and communication times, and through the use of validated analytical queueing models

Read more

Summary

Introduction

There are an explosive growth in a variety of collaborative group services in academia and industry for the past ten years [18]. The rapid growth in collaborative applications has heightened the need for a reliable group communication system. Kerberos consists of a client, application servers and a key distribution center (KDC). The client may represent a group of business users who request services from application servers. The KDC maintains a shared symmetric key with every client and the application servers in the realm. In case KDC is compromised (i.e., a single failure), all the symmetric keys will be divulged to the attacker and will have to be revoked. Recovering from such a compromise requires the reestablishment of new shared keys with the client and the application servers in the realm. Effort and financial resources, it is very costly for such a recovery

Objectives
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call