SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
On a session key compromise problem in [KC95] protocol
ACM SIGOPS Operating Systems Review
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Class of Flexible and Efficient Key Management Protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
IEEE Transactions on Dependable and Secure Computing
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Session resumption for the secure shell protocol
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Two attacks on Neuman-Stubblebine authentication protocols
Information Processing Letters
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Hi-index | 0.01 |
The Kerberos authentication service, a part of MIT's Project Athena, is based on the Needham and Schroeder protocol. Timestamps depending on reliable synchronized clocks are used to guarantee the freshness of messages. As an improvement, we present a nonce-based protocol offering the same features as Kerberos. We generate a ticket in an initial message exchange which includes a generalized timestamp. Checking this generalized timestamp is left to the principal who created it. Consequently we do not need synchronized clocks. Our protocol has the property of using a minimal number of messages to establish an authenticated session key.