CORC  > 兰州理工大学  > 兰州理工大学
Secure negotiation approach for share-secret-key of kerberos service
Cao, Lai-Cheng
2011
会议日期September 24, 2011 - September 25, 2011
会议地点Taiyuan, China
关键词Artificial intelligence Geometry Public key cryptography Computational advantages Diffie Hellman Distributed applications Elliptic curve cryptography Kerberos protocol Man in the middle attacks Security infrastructure Shared secrets
卷号7003 LNAI
期号PART 2
DOI10.1007/978-3-642-23887-1_13
页码101-107
英文摘要The generation and distribution of the shared secret-key in Kerberos protocol are a security infrastructure. In order to enhance the security of distributed applications based on Kerberos protocol, a scheme of the shared secret-key negotiation was put forward. The shared secret-key could be generated and distributed by the Diffie-Hellman algorithm. Negotiation parameters of communicating parties were protected by opposite party's public key to encrypt. The distribution of the public key and privacy key adopted ECC (Elliptic Curve Cryptography); there was a computational advantage to using ECC with a shorter key length than RSA. Security analysis shows that this scheme has high security and can resist Man-in-the-Middle attack. © 2011 Springer-Verlag.
会议录Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议录出版者Springer Verlag
语种英语
ISSN号03029743
内容类型会议论文
源URL[http://ir.lut.edu.cn/handle/2XXMBERH/116211]  
专题兰州理工大学
作者单位School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
推荐引用方式
GB/T 7714
Cao, Lai-Cheng. Secure negotiation approach for share-secret-key of kerberos service[C]. 见:. Taiyuan, China. September 24, 2011 - September 25, 2011.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace