Secure Coprocessor Integration with Kerberos V5
dc.contributor.author | Itoi, Naomaru | en_US |
dc.date.accessioned | 2014-07-18T18:11:52Z | |
dc.date.available | 2014-07-18T18:11:52Z | |
dc.date.issued | 2000-03-22 | en_US |
dc.identifier.citation | N. Itoi, "Secure Coprocessor Integration with Kerberos V5," March 2000. [USENIX Security Symposium, Denver (September 2000)] <http://hdl.handle.net/2027.42/107903> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107903 | |
dc.description.abstract | The nightmare of Trusted Third Party (t3P) based protocol users is compromise of the T3P. Because the compromised T3P can read and modify any user information, the entire user group becomes vulnerable to secret revelation and user impersonation. Kerberos, the most widely used network authentication protocol, is no exception. When the Kerberos Key Distribution Center (KDC) is compromised, all the user keys are exposed, thus revealing all the encrypted data and allowing an adversary to impersonate any user. If an adversary has physical access to the KDC host, or can obtain administrator rights, KDC compromise is possible and catastrophic. To solve this problem, and to demonstrate the capabilities of secure hardware, we have integrated the IBM 4758 secure coprocessor into Kerberos V5 KDC. As a result of the integration, our implemented KDC preserves security even if the KDC host has been compromised. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Secure Coprocessor Integration with Kerberos V5 | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107903/1/citi-tr-00-2.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.