Title :
Yaksha: augmenting Kerberos with public key cryptography
Author_Institution :
Center of Excellence for Electron. Commerce, Bell Atlantic, Silver Spring, MD, USA
Abstract :
The Kerberos authentication system is based on the trusted third-party Needham-Schroeder (1978) authentication protocol. The system is one of the few industry standards for authentication systems and its use is becoming fairly widespread. The system has some limitations, many of which are traceable to the decision of the Kerberos designers to solely use symmetric key cryptosystems. Using asymmetric (public-key) cryptosystems in an authentication protocol would prevent some of the shortcomings. Several such protocols have been proposed and some have been implemented. However, all these designs are either completely different from the Kerberos system, or require major changes to the basic system. Any attempts to improve Kerberos would do so with only minimal impact to the protocol and the source tree. In this work, we describe Yaksha, a new approach to achieving these goals. Yaksha uses as its building block an RSA (Rivest, Shamir & Adelman, 1978) algorithm variant independently invented by Boyd (1989) and by Ganesan and Yacobi (1994), in which the RSA private key is split into two portions. One portion becomes a user´s Yaksha password, and the other the Yaksha server´s password for that user. Using this simple but useful primitive, we show how we can blend the Kerberos system with a public-key infrastructure to create Yaksha, a more secure version of Kerberos, with minimal changes to the protocol
Keywords :
message authentication; protocols; public key cryptography; Kerberos; RSA algorithm variant; RSA private key; Yaksha; asymmetric cryptosystems; dictionary attacks; digital signatures; industry standards; key exchange; nonrepudiation; password; public key cryptography; secure version; source tree; trusted third-party authentication protocol; Authentication; Computer science; Cryptographic protocols; Dictionaries; Digital signatures; Electronic commerce; Public key; Public key cryptography; Silver; Springs;
Conference_Titel :
Network and Distributed System Security, 1995., Proceedings of the Symposium on
Conference_Location :
San Diego, CA
Print_ISBN :
0-8186-7027-4
DOI :
10.1109/NDSS.1995.390639