Design of Kerberos Authentication Mechanism based on WPKI

WPKI 기반 Kerberos 인증 메커니즘 설계

  • 이철승 (조선대학교 대학원 컴퓨터공학과) ;
  • 박찬모 (광주 과학기술원) ;
  • 이호영 (초당대학교 정보통신공학과) ;
  • 이준 (조선대학교 전자정보 공과대학 컴퓨터공학부)
  • Published : 2003.10.01

Abstract

In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.

Keywords

References

  1. K. Raeburn, 'Encryption and Checksum Specifications for kerberos 5.', March 2003
  2. WAP Forum, WAP Identity Module Specification, 18 February 2000
  3. M.Myers, 'X.509 Internet Public Key Infrastructure On-line Certificate Status Protocol-OCSP.' Network Working Group, 1999
  4. 'Wireless Application Protocol Public Key Infrastructures Definition', WAP forum, Feb. 2000
  5. R.Hously, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile.' Network Working Group, RFC2459, January
  6. R. Housley and other, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile.', Jan, 1999
  7. P.Gutmann, 'Internet X.509 Public Key Infrastructure operational protocols.', Internet Draft, , 2003
  8. S.Hartman, K.Raeburn, 'The Kerberos Network Authentication Service v5', Internet-Draft