The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Simple analytic modeling of software contention
ACM SIGMETRICS Performance Evaluation Review
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Enhanced mutual authentication and key exchange protocol for wireless communications
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
The performance of public key-based authentication protocols
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
Abstract: Several proposals have been made to public-key-enable various stages of the secret-key-based Kerberos network authentication protocol. The computational requirements of public key cryptography are much higher than those of secret key cryptography, and the substitution of public key encryption algorithms for secret key algorithms impacts performance. This paper uses closed, class-switching queuing models to demonstrate the quantitative performance differences between PKCROSS and PKTAPP-two proposals for public-key-enabling Kerberos. Our analysis shows that, while PKTAPP is more efficient for authenticating to a single server, PKCROSS outperforms the simpler protocol if there are two or more remote servers per remote realm. This heuristic can be used to guide a high-level protocol that combines both methods of authentication to improve performance.