scispace - formally typeset
Search or ask a question
Topic

Generic Security Service Algorithm for Secret Key Transaction

About: Generic Security Service Algorithm for Secret Key Transaction is a research topic. Over the lifetime, 529 publications have been published within this topic receiving 14926 citations.


Papers
More filters
Journal ArticleDOI

[...]

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Abstract: Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.

2,622 citations

Journal ArticleDOI

[...]

TL;DR: The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.
Abstract: When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can display the results to the user, or otherwise continue performing its intended function. This class of services includes remote login, file system reads and writes, and information retrieval for applications like Mosaic. >

1,500 citations

[...]

01 Sep 1993
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Abstract: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system Version 4, described elsewhere [1,2], is presently in production use at MIT's Project Athena, and at other Internet sites

1,428 citations

[...]

01 Jan 1988
TL;DR: An overview of the Kerberos authentication model as imple- mented for MIT's Project Athena is given, which describes the protocols used by clients, servers, and Kerbero to achieve authentication.
Abstract: In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users' identities. This paper gives an overview of the Kerberos authentication model as imple- mented for MIT's Project Athena. It describes the protocols used by clients, servers, and Kerberos to achieve authentication. It also describes the management and replication of the database required. The views of Kerberos as seen by the user, programmer, and administrator are described. Finally, the role of Kerberos in the larger Athena picture is given, along with a list of applications that presently use Kerberos for user authentica- tion. We describe the addition of Kerberos authentication to the Sun Network File Sys- tem as a case study for integrating Kerberos with an existing application.

1,197 citations

[...]

01 Jan 1991
TL;DR: Despite its many strengths, the Kerberos authentication system has a number of limitations and some weaknesses as mentioned in this paper, some of which are due to specifics of the MIT environment; others represent deficiencies in the protocol design.
Abstract: The Kerberos authentication system, a part of MIT's Project Athena, has been adopted by other organizations. Despite Kerberos's many strengths, it has a number of limitations and some weaknesses. Some are due to specifics of the MIT environment; others represent deficiencies in the protocol design. We discuss a number of such problems, and present solutions to some of them. We also demonstrate how special-purpose cryptographic hardware may be needed in some cases.

320 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
75% related
Network packet
159.7K papers, 2.2M citations
74% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
73% related
Wireless ad hoc network
49K papers, 1.1M citations
73% related
Mobile computing
51.3K papers, 1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20182
201721
201631
201534
201430
201329