Kerberos identity authentication protocol improvement method based on national cryptographic algorithm

A national secret algorithm and identity authentication technology, applied in the field of Kerberos identity authentication protocol improvement, can solve the problems of key management difficulties and increase overhead, and achieve the effect of improving security and efficiency, and realizing localization and autonomy.

Inactive Publication Date: 2021-11-05
JINLING INST OF TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through analysis, although the inherent security problems of the original protocol have been effectiv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kerberos identity authentication protocol improvement method based on national cryptographic algorithm
  • Kerberos identity authentication protocol improvement method based on national cryptographic algorithm
  • Kerberos identity authentication protocol improvement method based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0053] A method for improving the Kerberos identity authentication protocol based on the national secret algorithm of the present invention uses session key dynamics and a mixed cryptographic system based on the national secret algorithm to improve the traditional Kerberos protocol, and the improved Kerberos protocol includes a registration process and an authentication process ;

[0054]The authentication process retains three stages of traditional Kerberos authentication, which are:

[0055] The client and the authentication server (Authentication Server, AS) authenticate each other: the client sends AS_REQ to the AS, requesting AS authentication, the AS receives a challenge value sent to the client, the client responds to the AS after receiving it, and then the AS returns to the client AS_REP;

[0056] The client communicates with the Tick...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Kerberos identity authentication protocol improvement method based on a national cryptographic algorithm, a traditional Kerberos protocol is improved by using session key dynamics and a hybrid cryptosystem based on the national cryptographic algorithm, and the improved Kerberos protocol comprises a registration process and an authentication process; wherein the authentication process comprises three stages: mutual authentication between the client and the AS; the client communicates with the TGS; the client communicates with the application server; a dynamic key is used as a shared key between the client and the AS, and encryption and decryption are carried out by adopting a hybrid cryptosystem based on a national cryptographic algorithm in an authentication process. According to the method, rainbow table attacks, blasting attacks and counterfeit user attacks caused by weak passwords can be effectively resisted, and replay attacks, man-in-the-middle attacks and the like caused by time synchronization can be effectively resisted, so that the security and the efficiency of a Kerberos identity authentication protocol are improved.

Description

technical field [0001] The invention belongs to the technical field of identity authentication and privacy protection in cryptography, and in particular relates to an improvement method of a Kerberos identity authentication protocol based on a national secret algorithm. Background technique [0002] Identity authentication is the cornerstone of network security and is used to ensure the authenticity of both parties. As the most commonly used identity authentication protocol, the Kerberos protocol is widely used in many identity authentication systems such as banking systems, public security systems, and so on. Therefore, it is very important to discuss the defects of the Kerberos protocol and improve the Kerberos security scheme to ensure the security of the computer system. At the same time, since my country released commercial encryption in 2012, the field of encryption in my country has developed rapidly and is widely used in various fields such as e-government, e-commer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/14H04L9/32
CPCH04L63/045H04L63/0838H04L63/0869H04L9/0869H04L9/0872H04L63/0807H04L9/14H04L9/3213H04L9/3228H04L9/3297H04L9/3239H04L2209/72H04L9/50
Inventor 黄丹丹刘佳欣吴秋玲马乐军
Owner JINLING INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products