Font Size: a A A

Application Research Of Identity Authentication Of Kerberos Protocol Based On WPKI

Posted on:2008-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:Q S ZhuFull Text:PDF
GTID:2178360212474551Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Kerberos protocol is the most popular used for identity authentication. But it hasinherent security limitations. Based on particularly analysed authentication principle ofKerberos, this paper improved it by using public key cryptography and enhanced itssecurity performance wihtout changing its former frame. The improved protocolintroduced X.509 public key certificate and solved the bottleneck problem, keymanagement, of the former authentication system. At initial stage of autentication, theimproved protocol thoroughly solved the uppermost security limitation, password'sguess attack, by using technology of public key encryption and digital signature. Onthe base of it, this paper designed a wireless network authentication system whichbased on WPKI frame. It consists of Kerberos identity authentication system and WCAcertificate management system. And it is transparent to user's operation, has highersecurtiy and efficiency performance and easier to extend, which make it has higherpracticability. At last, this paper discussed the cross-realm authentication protocolwhich improved by introducing public key cryptography. The improved cross-realmauthentication protocol also introduced technology of public key encryption and digitalsignature at initial stage, safely transmitted the authentication information cross realm,and solved the difficult problem of safely preserving masses of session keys.
Keywords/Search Tags:Kerberos, Public Key Certificate, WPKI, Identity Authentication, Cross-realmAuthentication
PDF Full Text Request
Related items