• DocumentCode
    319043
  • Title

    Scalability and flexibility in authentication services: the KryptoKnight approach

  • Author

    Janson, Philippe ; Tsudik, Gene ; Yung, Moti

  • Author_Institution
    IBM Res. Div., Ruschlikon, Switzerland
  • Volume
    2
  • fYear
    1997
  • fDate
    7-12 Apr 1997
  • Firstpage
    725
  • Abstract
    This paper studies the issues of flexibility and scalability in the context of network security. In particular, it concentrates on authentication and key distribution services suited for a variety of communication paradigms, network environments, and end-devices. We present the design criteria, specification, and step-by-step construction of authentication and key distribution services based on experience in the KryptoKnight project. The central goal of the KryptoKnight project was the construction of basic network security functions in a minimal, flexible (thus, versatile) and scalable manner. Protocol minimality (in terms of resource usage) and flexibility are not merely theoretical goals; they have clear advantages in environments where computational resources are limited and connectivity is restricted. KryptoKnight was aimed at such environments: small and anemic wireless devices, simple network and data-link entities, embedded micro-devices and other special-purpose communication equipment and configurations. Furthermore, scalability of protocols makes their deployment possible in the presence of rapid network growth and inter-domain communication
  • Keywords
    cryptography; message authentication; protocols; security of data; KryptoKnight approach; authentication services; communication paradigms; computational resources; connectivity; data-link entities; design criteria; embedded micro-devices; end-devices; flexibility; inter-domain communication; key distribution services; network environments; network security; protocol minimality; rapid network growth; resource usage; scalability; simple network; special-purpose communication equipment; specification; step-by-step construction; wireless devices; Authentication; Communication equipment; Computer networks; Context; Cryptographic protocols; Embedded computing; Intelligent networks; Personal digital assistants; Scalability; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE
  • Conference_Location
    Kobe
  • ISSN
    0743-166X
  • Print_ISBN
    0-8186-7780-5
  • Type

    conf

  • DOI
    10.1109/INFCOM.1997.644526
  • Filename
    644526