Texas A&M University anarchistic Key authorization (AKA)

  • Authors:
  • David Safford;David K. Hess;Douglas Lee Schales

  • Affiliations:
  • Texas A&M University;Texas A&M University;Texas A&M University

  • Venue:
  • SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
  • Year:
  • 1996
  • STEL: secure TELnet

    SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5

Quantified Score

Hi-index 0.00

Visualization

Abstract

At the Fourth USENIX Security Conference, we presented a paper on SRA Telnet, which was a simple Diffie-Hellman based system to defeat standard password sniffing, without requiring externally validated keys. Since that time, several projects, such as Secure Telnet (stel), have worked to extend this simple Diffie-Hellman model to add data encryption, larger keys, and resistance to man-in-the-middle attack. Other projects, such as SSL and SSH use validated RSA keys for full authentication. This project uses standard PGP keys as the basis of unified authentication, authorization, and encryption, combining both perfect forward secrecy and strong RSA authentication.