Abstract
This paper discusses issues and idiosyncrasies associated with changing passwords and keys in distributed computer systems. Current approaches are often complicated and fail to provide the desired level of security and fault tolerance. A novel and very simple approach to changing passwords/keys is presented and analyzed. It provides a means for human users and service programs to change passwords and keys in a robust and secure fashion.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
National Bureau of Standards, Federal Information Processing Standards, National Bureau of Standards, Publication 46, 1977.
J. G. Steiner, B. C. Neuman, J. I. Schiller, Kerberos: An authentication service for open network systems, Usenix Conference Proceedings, Dallas, Texas, pp. 191–202, February 1988.
Open Software Foundation, DGE User's Reference Manual, Cambridge, Massachusetts, 1992.
S. M. Bellovin, M. Merrit, Limitations of the Kerberos Authentication System, Computer Communication Review, vol. 20(5), pp. 119–132, October 1990.
G. Tsudik, E. Van Herreweghen, On Simple and Secure Key Distribution, Proceedings of 1993 ACM Conference on Computer and Communications Security, November 1993.
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic Design of a Family of Attack-Resistant Authentication Protocols, IEEE JSAC Special Issue on Secure Communications, July 1993.
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, A Modular Family of Secure Protocols for Authentication and Key Distribution (DRAFT) in submission to IEEE Transactions on Communications, August 1993.
R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, Kryp to Knight Authentication and Key Distribution Service, Proceedings of ESORICS 92, October 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hauser, R., Janson, P., Molva, R., Tsudik, G., Van Herreweghen, E. (1994). Robust and secure password and key change method. In: Gollmann, D. (eds) Computer Security — ESORICS 94. ESORICS 1994. Lecture Notes in Computer Science, vol 875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58618-0_59
Download citation
DOI: https://doi.org/10.1007/3-540-58618-0_59
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58618-0
Online ISBN: 978-3-540-49034-0
eBook Packages: Springer Book Archive