Skip to main content

Secure Negotiation Approach for Share-Secret-Key of Kerberos Service

  • Conference paper
Artificial Intelligence and Computational Intelligence (AICI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7003))

  • 2115 Accesses

Abstract

The generation and distribution of the shared secret-key in Kerberos protocol are a security infrastructure. In order to enhance the security of distributed applications based on Kerberos protocol, a scheme of the shared secret-key negotiation was put forward. The shared secret-key could be generated and distributed by the Diffie-Hellman algorithm. Negotiation parameters of communicating parties were protected by opposite party’s public key to encrypt. The distribution of the public key and privacy key adopted ECC (Elliptic Curve Cryptography); there was a computational advantage to using ECC with a shorter key length than RSA. Security analysis shows that this scheme has high security and can resist Man-in-the-Middle attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Küsters, R., Tuengerthal, M.: Ideal Key Derivation and Encryption in Simulation-Based Security. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 161–179. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Jia, K., Chen, X., Xu, G.: The improved public key encryption algorithm of Kerberos protocol based on braid groups. In: 2008 International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2008), vol. 1, pp. 1–4 (2008)

    Google Scholar 

  3. Liu, K.-l., Qing, S.-h., Meng, Y.: An Improved Way on Kerberos Protocol Based on Public-Key Algorithms. Journal of Software 12(6), 872–877 (2001)

    Google Scholar 

  4. Jurisc, A., Menezes, A.: Elliptic Curve Cryptography. Dobb’s Journal, 135–140 (April 1997)

    Google Scholar 

  5. Cao, L.-C.: Enhancing Distributed Web Security Based on Kerberos Authentication Service. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) Web Information Systems and Mining. LNCS, vol. 6318, pp. 171–178. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Rao, G.S.V.R.K.: Threats and security of Web services - a theoretical short study. In: Proceedings of IEEE International Symposium Communications and Information Technology, vol. 2(2), pp. 783–786 (2004)

    Google Scholar 

  7. Seixas, N., Fonseca, J., Vieira, M.: Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study. Software Reliability Engineering 1, 129–135 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, LC. (2011). Secure Negotiation Approach for Share-Secret-Key of Kerberos Service. In: Deng, H., Miao, D., Lei, J., Wang, F.L. (eds) Artificial Intelligence and Computational Intelligence. AICI 2011. Lecture Notes in Computer Science(), vol 7003. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23887-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23887-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23886-4

  • Online ISBN: 978-3-642-23887-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics