Since any suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT (Public Key Cryptography for Initial Authentication) presented by IETF (Internet Engineering Task Force) CAT working group. In this paper, an efficient Kerberos authentication mechanism associated with X.509 and Domain Name system (DNS) is presented by employing the two distinct key management systems - asymmetric and symmetric methods. A new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Cheolhyun KIM, Ilyong CHUNG, "An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System)" in IEICE TRANSACTIONS on Information,
vol. E85-D, no. 9, pp. 1384-1389, September 2002, doi: .
Abstract: Since any suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT (Public Key Cryptography for Initial Authentication) presented by IETF (Internet Engineering Task Force) CAT working group. In this paper, an efficient Kerberos authentication mechanism associated with X.509 and Domain Name system (DNS) is presented by employing the two distinct key management systems - asymmetric and symmetric methods. A new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity.
URL: https://global.ieice.org/en_transactions/information/10.1587/e85-d_9_1384/_p
Copy
@ARTICLE{e85-d_9_1384,
author={Cheolhyun KIM, Ilyong CHUNG, },
journal={IEICE TRANSACTIONS on Information},
title={An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System)},
year={2002},
volume={E85-D},
number={9},
pages={1384-1389},
abstract={Since any suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT (Public Key Cryptography for Initial Authentication) presented by IETF (Internet Engineering Task Force) CAT working group. In this paper, an efficient Kerberos authentication mechanism associated with X.509 and Domain Name system (DNS) is presented by employing the two distinct key management systems - asymmetric and symmetric methods. A new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity.},
keywords={},
doi={},
ISSN={},
month={September},}
Copy
TY - JOUR
TI - An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System)
T2 - IEICE TRANSACTIONS on Information
SP - 1384
EP - 1389
AU - Cheolhyun KIM
AU - Ilyong CHUNG
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Information
SN -
VL - E85-D
IS - 9
JA - IEICE TRANSACTIONS on Information
Y1 - September 2002
AB - Since any suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT (Public Key Cryptography for Initial Authentication) presented by IETF (Internet Engineering Task Force) CAT working group. In this paper, an efficient Kerberos authentication mechanism associated with X.509 and Domain Name system (DNS) is presented by employing the two distinct key management systems - asymmetric and symmetric methods. A new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity.
ER -