Skip to main content

Replicating the Kuperee authentication server for increased security and reliability

Extended abstract

  • Session 1: Authentication
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. Hardjono and J. Seberry, “Authentication via multi-service tickets in the kuperee server,” in Computer Security — ESORICS'94: Proceedings of the Third European Symposium on Research in Computer Security (D. Gollmann, ed.), vol. 875 of LNCS, pp. 143–160, Springer-Verlag, 1994.

    Google Scholar 

  2. Y. Zheng and J. Seberry, “Immunizing public key cryptosystems against chosen ciphertext attacks,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 715–724, 1993.

    Google Scholar 

  3. T. Hardjono, “Kuperee simplified,” Technical Report Preprint 95-5, Centre for Computer Security Research, Computer Science Department, University of Wollongong, December 1994.

    Google Scholar 

  4. Y. Ding and P. Horster, “Why the kuperee authentication system fails,” Operating Systems Review, vol. 30, no. 2, pp. 42–51, 1996.

    Google Scholar 

  5. J. G. Steiner, C. Neuman, and J. I. Schiller, “Kerberos: an authentication service for open network systems,” in Proceedings of the 1988 USENIX Winter Conference, (Dallas, TX), pp. 191–202, 1988.

    Google Scholar 

  6. S. M. Bellovin and M. Merritt, “Limitations of the Kerberos authentication system,” Computer Communications Review, vol. 20, no. 5, pp. 119–132, 1990.

    Google Scholar 

  7. J. T. Kohl, “The evolution of the kerberos authentication service,” in Proceedings of the Spring 1991 EurOpen Conference, (TromsØ, Norway), 1991.

    Google Scholar 

  8. L. Gong, “Increasing availability and security of an authentication service,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657–662, 1993.

    Google Scholar 

  9. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.

    Google Scholar 

  10. G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the National Computer Conference, AFIPS Conference Proceedings, Vol. 48, pp. 313–317, 1979.

    Google Scholar 

  11. R. M. Needham and M. D. Schroeder, “Using encryption for authentication in a large network of computers,” Communications of the ACM, vol. 21, no. 12, pp. 993–999, 1978.

    Google Scholar 

  12. R. M. Needham and M. D. Schroeder, “Authentication revisited,” Operating Systems Review, vol. 21, no. 1, p. 7, 1987.

    Google Scholar 

  13. T. Y. C. Woo and S. S. Lam, “Authentication for distributed systems,” IEEE Computer, vol. 25, pp. 39–52, January 1992.

    Google Scholar 

  14. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644–654, 1976.

    Google Scholar 

  15. T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469–472, 1985.

    Google Scholar 

  16. Y. Zheng, T. Hardjono, and J. Seberry, “Reusing shares in secret sharing schemes,” The Computer Journal, vol. 17, pp. 199–205, March 1994.

    Google Scholar 

  17. G. J. Simmons, “An introduction to shared secret and/or shared control schemes and their application,” in Contemporary Cryptology (G. J. Simmons, ed.), pp. 441–497, IEEE Press, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hardjono, T., Seberry, J. (1996). Replicating the Kuperee authentication server for increased security and reliability. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023283

Download citation

  • DOI: https://doi.org/10.1007/BFb0023283

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics