Advanced Search
Volume 22 Issue 1
Jan.  2000
Turn off MathJax
Article Contents
Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.
Citation: Sun Xiaorong, Wang Yumin. SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT[J]. Journal of Electronics & Information Technology, 2000, 22(1): 104-111.

SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT

  • Received Date: 1998-05-28
  • Rev Recd Date: 1999-02-28
  • Publish Date: 2000-01-19
  • In this paper,the solutions to the security issues of Internet/Intranet environment are proposed.And authentication and key distribution protocols are presented,which can be incorporated into the OSI (Open System Interconnection) architecture.The protocol adopt modified Kerberos authentication protocol at the lower sublayer, and design authenticated key exchange protocols using symmetric or asymmetric cryptosystem at the upper sublayer for different solutions.The protocols can be used for remote access applications,thus it is benefit to security manage of Intranet.
  • loading
  • 徐胜波,王新梅.Internet网络环境中认证和密钥分配的研究.通信学报,1997,18(12):83-88.[2]ISO 7498-2,Information processing system-Open system intercomnection reference model,security architecture,1988[3]Draft Recommendation X.509,The Directory-Authentication Framework,Version 7:Glouccester.[4]Chokhani S Towards a national public key infrastructture.IEEE Comm.Mag.,1994,32(9):70-75.[5]Rivest R,shamir A.Adleman L.A method for obtaining digital signature and public key cryptosystems.Comm.Of ACM.,1978,21(2):120-126.[6]Diffie W, Hellman M E.New direction in cryptography.IEEE Trans,on IT,1976,IT-22(6):644-654.[7]Hwang T,Ku W Reparable key distribution protocols for internet environments.IEEE Trans.On Comm.,1995,COM-43(5):1947-1949.[8]Fumy W.(Local area) Network Security Computer Security and Industrial Cryptography,Lecture,Notion Computer Science,EAST Course,Belgium:1991,211-226.[9]Fumy W,Leclerc M.Integration of key management protocol into the OSI architecture,Proc.Of CS90:Symposium on Computer Security:Fondazione Ugo Bordoni:1991,151-159.[10]Diffie w Security for the DoD transmission control protocol Proc.Of Crypto85:Springer LNCS 218,1986,108-127.[11]Diffie w,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchange.design,code and cryptography 1992:120-126.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1750) PDF downloads(549) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return