Looking at web security vulnerabilities from the programming language perspective: a field study
ISSRE'09 Proceedings of the 20th IEEE international conference on software reliability engineering
Enhancing distributed web security based on Kerberos authentication service
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Ideal key derivation and encryption in simulation-based security
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Hi-index | 0.00 |
The generation and distribution of the shared secret-key in Kerberos protocol are a security infrastructure. In order to enhance the security of distributed applications based on Kerberos protocol, a scheme of the shared secret-key negotiation was put forward. The shared secret-key could be generated and distributed by the Diffie-Hellman algorithm. Negotiation parameters of communicating parties were protected by opposite party's public key to encrypt. The distribution of the public key and privacy key adopted ECC (Elliptic Curve Cryptography); there was a computational advantage to using ECC with a shorter key length than RSA. Security analysis shows that this scheme has high security and can resist Man-in-the-Middle attack.