Browse > Article

Design of Kerberos Authentication Mechanism based on WPKI  

Lee, Cheol-Seung (조선대학교 대학원 컴퓨터공학과)
Park, Chan-Mo (광주 과학기술원)
Lee, Ho-Young (초당대학교 정보통신공학과)
Lee, Joon (조선대학교 전자정보 공과대학 컴퓨터공학부)
Abstract
In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.
Keywords
WPKI; Authentication; Kerberos V5; X.509 V3;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R.Hously, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile.' Network Working Group, RFC2459, January
2 P.Gutmann, 'Internet X.509 Public Key Infrastructure operational protocols.', Internet Draft, , 2003
3 S.Hartman, K.Raeburn, 'The Kerberos Network Authentication Service v5', Internet-Draft
4 WAP Forum, WAP Identity Module Specification, 18 February 2000
5 K. Raeburn, 'Encryption and Checksum Specifications for kerberos 5.', March 2003
6 'Wireless Application Protocol Public Key Infrastructures Definition', WAP forum, Feb. 2000
7 M.Myers, 'X.509 Internet Public Key Infrastructure On-line Certificate Status Protocol-OCSP.' Network Working Group, 1999
8 R. Housley and other, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile.', Jan, 1999