透過您的圖書館登入
IP:13.58.252.8

並列摘要


We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center saves a profile for every instance in its realm to generate the principle's secret-key by hashing the profile, and encrypting the output digest. Besides, the lifetime of the secret-key is controlled using the system clock. Triple-Des is used for encryption, SHA-256 for hashing, and Blum Blum Shub for random number generation.

被引用紀錄


Wen, C. H. (2002). UMTS使用者認證協定之研究 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu200200311

延伸閱讀