Internet/Intranet互聯(lián)環(huán)境中的安全認(rèn)證和密鑰分配
SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT
-
摘要: 本文提出了解決Internet/Intranet互聯(lián)環(huán)境安全性問題的模式,針對不同的Intranet的網(wǎng)絡(luò)結(jié)構(gòu),提出了適用的安全模式,設(shè)計了相應(yīng)的認(rèn)證和密鑰分配協(xié)議,并考慮了協(xié)議在開放系統(tǒng)互聯(lián)OSI結(jié)構(gòu)的安全管理問題.協(xié)議采用分層機制,在低層采用改進的Kerberos協(xié)議實現(xiàn)局域網(wǎng)內(nèi)的認(rèn)證和密鑰分配,而高層的網(wǎng)間認(rèn)證和密鑰分配協(xié)議則根據(jù)安全模式的不同要求采用單鑰體制,或公鑰體制來設(shè)計。協(xié)議能夠為Internet的各種遠(yuǎn)程訪問提供安全保護。Abstract: In this paper,the solutions to the security issues of Internet/Intranet environment are proposed.And authentication and key distribution protocols are presented,which can be incorporated into the OSI (Open System Interconnection) architecture.The protocol adopt modified Kerberos authentication protocol at the lower sublayer, and design authenticated key exchange protocols using symmetric or asymmetric cryptosystem at the upper sublayer for different solutions.The protocols can be used for remote access applications,thus it is benefit to security manage of Intranet.
-
徐勝波,王新梅.Internet網(wǎng)絡(luò)環(huán)境中認(rèn)證和密鑰分配的研究.通信學(xué)報,1997,18(12):83-88.[2]ISO 7498-2,Information processing system-Open system intercomnection reference model,security architecture,1988[3]Draft Recommendation X.509,The Directory-Authentication Framework,Version 7:Glouccester.[4]Chokhani S Towards a national public key infrastructture.IEEE Comm.Mag.,1994,32(9):70-75.[5]Rivest R,shamir A.Adleman L.A method for obtaining digital signature and public key cryptosystems.Comm.Of ACM.,1978,21(2):120-126.[6]Diffie W, Hellman M E.New direction in cryptography.IEEE Trans,on IT,1976,IT-22(6):644-654.[7]Hwang T,Ku W Reparable key distribution protocols for internet environments.IEEE Trans.On Comm.,1995,COM-43(5):1947-1949.[8]Fumy W.(Local area) Network Security Computer Security and Industrial Cryptography,Lecture,Notion Computer Science,EAST Course,Belgium:1991,211-226.[9]Fumy W,Leclerc M.Integration of key management protocol into the OSI architecture,Proc.Of CS90:Symposium on Computer Security:Fondazione Ugo Bordoni:1991,151-159.[10]Diffie w Security for the DoD transmission control protocol Proc.Of Crypto85:Springer LNCS 218,1986,108-127.[11]Diffie w,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchange.design,code and cryptography 1992:120-126. -
計量
- 文章訪問數(shù): 1774
- HTML全文瀏覽量: 82
- PDF下載量: 552
- 被引次數(shù): 0