THE KRYPTOKNIGHT FAMILY OF LIGHTWEIGHT PROTOCOLS FOR AUTHENTICATION AND KEY DISTRIBUTION

Citation
R. Bird et al., THE KRYPTOKNIGHT FAMILY OF LIGHTWEIGHT PROTOCOLS FOR AUTHENTICATION AND KEY DISTRIBUTION, IEEE/ACM transactions on networking, 3(1), 1995, pp. 31-41
Citations number
27
Categorie Soggetti
Engineering, Eletrical & Electronic","Computer Science Hardware & Architecture
ISSN journal
10636692
Volume
3
Issue
1
Year of publication
1995
Pages
31 - 41
Database
ISI
SICI code
1063-6692(1995)3:1<31:TKFOLP>2.0.ZU;2-G
Abstract
An essential function for achieving security in computer networks is r eliable authentication of communicating parties and network components . Such authentication typically relies on exchanges of cryptographic m essages between the involved parties, which in turn implies that these parties be able to acquire shared secret keys or certified public key s. Provision of authentication and key distribution functions in the p rimitive and resource-constrained environments of low-function network ing mechanisms, portable, or wireless devices presents challenges in t erms of resource usage, system management, ease of use, efficiency, an d flexibility that are beyond the capabilities of previous designs suc h as Kerberos or X.509. This paper presents a family of light-weight a uthentication and key distribution protocols suitable for use in the l ow layers of network architectures. All the protocols are built around a common two-way authentication protocol. The paper argues that key d istribution may require substantially different approaches in differen t network environments and shows that the proposed family of protocols offers a flexible palette of compatible solutions addressing many dif ferent networking scenarios. The mechanisms are minimal in cryptograph ic processing and message size, yet they are strong enough to meet the needs of secure key distribution for network entity authentication. T he protocols presented have been implemented as part of a comprehensiv e security subsystem prototype called KryptoKnight, whose software and implementation aspects are discussed in [16], and which is the basis for the recently announced IBM Network Security Program product.