Abstract
This paper describes various ways of providing freshness assurance of authentication protocols. It approaches the issue by discussing the notion of time in distributed authentication. In the context of authentication, we identify the places where the concept of time is needed, and describe the ways that timeliness of authentication protocols can be achieved.
Chapter PDF
Key words
References
Bauspieß, F., Knobloch, H.-J.: How to Keep Authenticity Alive in a Computer Network. Proceedings Eurocrypt'89, Springer LNCS 434 (1990) 38–46
Bauspieß, F.: SELANE: An Approach to Secure Networks. Proc eedings SECURICOM 90 (1990) 159–164
Bellovin, S.M., Merritt, M.: Limitations of the Kerberos Authentication System. ACM Computer Communications Review 20(5) (1990) 119–132
ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31 (1985) 469–472
Guenther, C.G.: An Identity-Based Key-Exchanged Protocol. Proceedings Eurocrypt'89, Springer LNCS 434 (1990) 29–37
Horster, P., Knobloch, H.-J.: Protocols for Secure Networks. Proceedings Eurocrypt'91, Springer LNCS 547 (1991) 399–408
Lamport, L., Melliar-Smith, P.M.: Byzantine Clock Synchronization. ACM Operating Systems Review 20(3) (1986) 10–16
Miller, S.P., Neuman, C., Schiller, J.I., and Saltzer, J.H.: Kerberos Authentication and Authorization System. Project Athena Technical Plan Section E.2.1, MIT (July 1987)
Mill, D.: Internet Time Synchronization: the Network Time Protocol. RFC 1129 (October 1989)
National Bureau of Standards: Data Encryption Standard. FIPS Publication 46 (1977)
Needham, R.M., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. CACM 21(12) (1978) 993–999
R.M. Needham, Schroeder, M.: Authentication Revisited. ACM Operating Systems Review 21(1) (1987) 7
Schneider, F.B.: A Paradigm for Reliable Clock Synchronization. Proceedings of the Advanced Seminar on Real-Time Local Area Networks (1986)
Steiner, J.G., Neuman, C., Schiller, J.I.: Kerberos: An Authentication Service for Open Network Systems. Usenix Workshop Proceedings, UNIX Security Workshop, Portland (1988)
Turski. W.M.: What to do when we cannot depend on time. Workshop on Mathematical Concepts of Dependable Systems, Oberwolfach (1990)
Woo, T.Y.C., Lam, S.S.: Authentication for Distributed Systems. IEEE Computer 25(1) (1992) 39–52
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Lam, Ky., Gollmann, D. (1992). Freshness assurance of authentication protocols. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013902
Download citation
DOI: https://doi.org/10.1007/BFb0013902
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive