Abstract
This paper discusses the use of time in distributed authentication. Our first objective is to give reasons for the provision of authentication protocols whose correctness depends on the correct generation of timestamps. Our second objective is to explain that this proposal is not, at least theoretically, as insecure as it first seems to be. The conclusion of this paper motivated our current effort of designing a secure clock synchronization protocol as a part of our overall goal of building a secure distributed system.
Chapter PDF
References
Bellovin, S.M., Merritt, M.: Limitations of the Kerberos Authentication System. ACM Computer Communications Review 20(5) (1990) 119–132
Birrell, A.D., Nelson, B.J.: Implementing Remote Procedure Calls. ACM Trans. on Computer Systems 2(1) (1984)
Denning, D.E., Sacco, G.M.: Timestamps in Key Distributed Protocols. CACM 24(8) (1981) 533–536
Horster, P., Knobloch, H.-J.: Protocols for Secure Networks. Proceedings Eurocrypt'91, Springer LNCS 547 (1991) 399–408
ISO/IEC: Information Technology — Security Techniques — Entity Authentication Mechanisms — Part 1: General Model. ISO/IEC 9798-1
Lam, K.-Y.: Replay-Tolerance of Distributed Authentication. E.I.S.S. Technical Report (in preparation)
Lam, K.-Y., Gollmann, D.: Freshness Assurance of Authentication Protocols. Proceedings ESORICS'92, Toulouse, (1992)
Lamport, L., Melliar-Smith, P.M.: Byzantine Clock Synchronization. ACM Operating Systems Review 20(3) (1986) 10–16
Miller, S.P., Neuman, C., Schiller, J.I., Saltzer, J.H.: Kerberos Authentication and Authorization System. Project Athena Technical Plan Section E.2.1, MIT (July 1987)
Mill, D.: Internet Time Synchronization: the Network Time Protocol. RFC 1129 (October 1989)
Needham, R.M., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. CACM 21(12) (1978) 993–999
Needham, R.M., Schroeder, M.: Authentication Revisited. ACM Operating Systems Review 21(1) (1987) 7
Otway, D. O., Rees, O.: Efficient and Timely Mutual Authentication. ACM Operating Systems Review 21(1) (1987) 8–10
Salkield, T.J.: Secure Network Time Synchronization. Ph.D. Thesis Proposal, Computer Science Dept, Royal Holloway, University of London (1992)
Schneider, F.B.: A Paradigm for Reliable Clock Synchronization. Proceedings of the Advanced Seminar on Real-Time Local Area Networks (1986)
SUN MicroSystems, Inc.: Networking Programming. (May 1988)
Tardo, J.J., Alagappan, K.: SPX — Global Authentication Using Public-Key Certificates. Proceedings of the IEEE Symposium on Security and Privacy (1991) 232–244
C.C.I.T.T.: The Directory — Authentication Framework. C.C.I.T.T. (December 1988)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Lam, KY., Beth, T. (1992). Timely authentication in distributed systems. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013904
Download citation
DOI: https://doi.org/10.1007/BFb0013904
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive