The Wayback Machine - https://web.archive.org/web/20080215095810/http://citeseer.ist.psu.edu:80/3136.html
Limitations of the Kerberos Authentication System (1991)  (Make Corrections)  (79 citations)
Steven M. Bellovin, Michael Merritt
USENIX Conference Proceedings



  Home/Search   Context   Related

 
View or download:
att.com/~smb/paper...erblimit.usenix.ps
raptor.com/lib/./kerblimit.usenix.ps
ticl.co.uk/securityCD/doc...kerb_lim.ps
Cached:  PS.gz  PS  PDF   Image  Update  Help
Problem Downloading?
From:  counterpane.com/biblio...authorB (more)
From:  raptor.com/lib/
(Enter author homepages)

Rate this article: (best)
  Comment on this article  
(Enter summary)

Abstract: The Kerberos authentication system, a part of MIT's Project Athena, has been adopted by other organizations. Despite Kerberos's many strengths, it has a number of limitations and some weaknesses. Some are due to specifics of the MIT environment; others represent deficiencies in the protocol design. We discuss a number of such problems, and present solutions to some of them. We also demonstrate how specialpurpose cryptographic hardware may be needed in some cases. INTRODUCTION The Kerberos... (Update)

Cited by:   More
Authentication and Authenticated Key Exchanges - Diffie, van Oorschot, Wiener (1992)   (Correct)
Mechanising BAN Kerberos by the Inductive Method - Bella, Paulson (1998)   (Correct)
Watermarking Schemes and Protocols for Protecting Rightful.. - Qiao, Nahrstedt (1998)   (Correct)

Similar documents (at the sentence level):
39.3%:   Limitations of the Kerberos Protocol - Bellovin, Merritt (1991)   (Correct)

Active bibliography (related documents):   More   All
0.5:   Using the Domain Name System for System Break-ins - Bellovin (1995)   (Correct)
0.2:   There Be Dragons - Bellovin (1992)   (Correct)
0.2:   The Great Disconnection? - Michael Schwartz   (Correct)

Similar documents based on text:   More   All
0.6:   Heimdal and Windows 2000 Kerberos - how to get them to.. - Westerlund, Danielsson (2001)   (Correct)
0.5:   An Authentication Service for Open Network Systems - Steiner, Neuman, Schiller (1988)   (Correct)
0.5:   The Kerberos Network Authentication Service - Kohl, Neuman (1991)   (Correct)

Related documents from co-citation:   More   All
36:   Using encryption for authentication in large networks of computers (context) - Needham, Schroeder - 1978
32:   Kerberos: An authentication service for open network systems - Steiner, Neuman et al. - 1988
25:   A Logic of Authentication - Burrows, Abadi et al. - 1990

BibTeX entry:   (Update)

S. M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Proc. of the Winter 1991 USENIX Conference, pages 253--267, 1991. http://citeseer.ist.psu.edu/article/bellovin91limitations.html   More

@inproceedings{ bellovin91limitations,
    author = "Steven M. Bellovin and Michael Merritt",
    title = "Limitations of the {K}erberos Authentication System",
    booktitle = "{USENIX} Conference Proceedings",
    month = "Winter",
    publisher = "USENIX",
    address = "Dallas, TX",
    pages = "253--267",
    year = "1991",
    url = "citeseer.ist.psu.edu/article/bellovin91limitations.html" }
Citations (may not include all citations):
640   Transmission Control Protocol (context) - Postel - 1981
635   New Directions in Cryptography - Diffie, Hellman - 1976
317   Kerberos: An Authentication Service for Open Network Systems - Steiner, Neuman et al. - 1988
304   User Datagram Protocol - Postel - 1980
57   MD4 message digest algorithm (context) - Rivest - 1990
54   Network Time Protocol (context) - Mills - 1989
47   Protocol Failures in Cryptosystems (context) - Moore - 1988
25   Codebreakers: The Story of Secret Writing (context) - Kahn - 1967
19   Time Protocol (context) - Postel, Harrenstien - 1983
13   Protocols for Data Security (context) - DeMillo, Merritt - 1983
13   UNIX Password Security (context) - Morris, Thompson - 1979
4   Stalking the Wiley Hacker (context) - Stoll - 1988
2   Designing an Authentication System: A Dialogue in Four Scene.. (context) - Bryant - 1988
1   Operating System Security (context) - Grampp, Morris - 1984
1   A Weakness in the 4.2BSD TCP/IP Software (context) - Morris - 1985
1   The Kerberos Network Authentication Service (context) - Kerckhoffs, Militaire et al. - 1989
1   private communication June (context) - Saltzer - 1990
1   Reducing Risks from Poorly Chosen Keys (context) - Draft, LaMacchia et al. - 1989
1   Machine 14 USENIX -- Winter '91 -- Dallas (context) - Deavours, Kruh - 1985



The graph only includes citing articles where the year of publication is known.


Documents on the same site (http://www.counterpane.com/biblio/author-B.html):   More
Time-Stamping with Binary Linking Schemes - Buldas, Laud, Lipmaa, Villemson (1998)   (Correct)
A Brief Review on the Impossibility of Quantum Bit Commitment - Brassard, Crépeau (1997)   (Correct)
Non-Transitive Transfer of Confidence: A Perfect.. - Brassard, Crepeau (1986)   (Correct)

Online articles have much greater impact   More about CiteSeer.IST   Add search form to your site   Submit documents   Feedback  

CiteSeer.IST - Copyright Penn State and NEC