Cryptographic Authentication for Real - Time Network Protocols 1 , 2
نویسنده
چکیده
This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synchronization and event scheduling applications. It outlines the design requirements of these protocols and why these requirements cannot be met using conventional cryptography and algorithms. It proposes a new design called autokey, which uses a combination of public-key cryptography and a psuedo-random sequence of one-way hash functions. Autokey has been implemented for the Network Time Protocol (NTP), but it can be adapted to other similar protocols. The paper describes the protocol operations, data structures and resources required for autokey, as well as a preliminary vulnerability assessment. AMS keywords: cryptography 94A60, data encryption 68P25
منابع مشابه
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کامل1 Authentication Scheme for Distributed , Ubiquitous , Real - Time Protocols
Cryptographic authentication methodology proposed for use in the Internet require substantial resources when very large client populations are involved. Resource provisioning becomes especially important when time-critical services are involved. In the cast of timesynchronization services, a special case exists, since cryptographic keys must enforce valid lifetimes, but validating key lifetimes...
متن کاملTimestamps for Network Authentication Protocols Revisited
In network security protocols, the freshness and uniqueness of a particular protocol-run provide a strong defense against replay attacks. These two properties are incorporated into a protocol interaction by the use of time-variant parameters such as nonces, random numbers, sequence numbers and timestamps. Many of the network authentication protocols can be classi ed into two main streams by the...
متن کاملEvaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multi-hop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof to verify the security of our proposals using Scyther, wh...
متن کاملSystematic 0esign of a Family of Attack-Resistant Authentication Protocols
The extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. ne-way, password-based authentication techniques are not sufficient to cope with the issues at han...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998