Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.
Citation:
Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.
Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.
Citation:
Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.
In this paper,the solutions to the security issues of Internet/Intranet environment are proposed.And authentication and key distribution protocols are presented,which can be incorporated into the OSI (Open System Interconnection) architecture.The protocol adopt modified Kerberos authentication protocol at the lower sublayer, and design authenticated key exchange protocols using symmetric or asymmetric cryptosystem at the upper sublayer for different solutions.The protocols can be used for remote access applications,thus it is benefit to security manage of Intranet.
徐胜波,王新梅.Internet网络环境中认证和密钥分配的研究.通信学报,1997,18(12):83-88.[2]ISO 7498-2,Information processing system-Open system intercomnection reference model,security architecture,1988[3]Draft Recommendation X.509,The Directory-Authentication Framework,Version 7:Glouccester.[4]Chokhani S Towards a national public key infrastructture.IEEE Comm.Mag.,1994,32(9):70-75.[5]Rivest R,shamir A.Adleman L.A method for obtaining digital signature and public key cryptosystems.Comm.Of ACM.,1978,21(2):120-126.[6]Diffie W, Hellman M E.New direction in cryptography.IEEE Trans,on IT,1976,IT-22(6):644-654.[7]Hwang T,Ku W Reparable key distribution protocols for internet environments.IEEE Trans.On Comm.,1995,COM-43(5):1947-1949.[8]Fumy W.(Local area) Network Security Computer Security and Industrial Cryptography,Lecture,Notion Computer Science,EAST Course,Belgium:1991,211-226.[9]Fumy W,Leclerc M.Integration of key management protocol into the OSI architecture,Proc.Of CS90:Symposium on Computer Security:Fondazione Ugo Bordoni:1991,151-159.[10]Diffie w Security for the DoD transmission control protocol Proc.Of Crypto85:Springer LNCS 218,1986,108-127.[11]Diffie w,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchange.design,code and cryptography 1992:120-126.