SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS

被引:66
作者
BIRD, R
GOPAL, I
HERZBERG, A
JANSON, PA
KUTTEN, S
MOLVA, R
YUNG, M
机构
[1] IBM CORP,THOMAS J WATSON RES CTR,YORKTOWN HTS,NY 10598
[2] IBM CORP,ZURICH RES LAB,ZURICH,SWITZERLAND
[3] INST EURECOM,DEPT CORP COMMUN,SOPHIA ANTIPOLIS,FRANCE
关键词
D O I
10.1109/49.223869
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. One-way password-based authentication techniques are not sufficient to cope with the issues at hand. Modern designs rely on two-way cryptographic authentication protocols. However, most existing designs suffer from one or more limitations: they require synchronization of local clocks, they are subject to export restrictions because of the way they use cryptographic functions, they are not amenable to use in lower layers of network protocols because of the size and complexity of messages they use, etc. Designing suitable cryptographic protocols that cater to large and dynamic network communities but do not suffer from the above problems presents substantial challenges in terms of ease of use, efficiency, flexibility, and above all security. This paper discusses the above challenges; shows how a few simple protocols, including one proposed by ISO, can easily be broken; and derives a series of desirable properties that authentication protocols should exhibit to meet the requirements of future large and dynamic network communities. Then the paper describes a methodology that was developed to systematically build and test the security of a family of cryptographic two-way authentication protocols that are as simple as possible yet resistant to a wide class of attacks, efficient, easy to implement and use, and amenable to many different networking environments. It also discusses several concrete examples of protocols of that family that presents various advantages in specific distributed system scenarios.
引用
收藏
页码:679 / 693
页数:15
相关论文
共 26 条
[1]  
ANSON CI, 1990, ACM CR, V20, P30
[2]   A KEY DISTRIBUTION PROTOCOL USING EVENT MARKERS [J].
BAUER, RK ;
BERSON, TA ;
FEIERTAG, RJ .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :249-255
[3]  
BELLOVIN SM, 1990, ACM COMPUTER COMMUNI, V20, P119
[4]  
BIHAM E, 1990, JUN P CRYPTO 90
[5]  
BIRD R, 1991, LECTURE NOTES COMPUT, V576
[6]  
BURROWS M, 1989, 12TH P ACM SOSP ACM, V23, P1
[7]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[8]  
GONG L, 1989, COMPUT COMMUN REV, V19, P8
[9]  
JUENEMAN JJ, 1985, IEEE COMMUNICATION M, P29
[10]  
MEYER CH, 1982, CRYPTOGRAPHY NEW DIM