The performance analysis of public key cryptography-based authentication

Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authenticati...

Full description

Bibliographic Details
Main Author: Kaiqi Xiong
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2018-05-01
Series:EAI Endorsed Transactions on Security and Safety
Subjects:
Online Access:http://eudl.eu/doi/10.4108/eai.15-5-2018.154770
id doaj-5aa9be896bb94120af39a8b9ff04028a
record_format Article
spelling doaj-5aa9be896bb94120af39a8b9ff04028a2020-11-25T02:37:16ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932018-05-0141411510.4108/eai.15-5-2018.154770The performance analysis of public key cryptography-based authenticationKaiqi Xiong0University of South Florida, Tampa, Florida 33620, USA; xiongk@usf.eduSeveral Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA) are considered two notable techniques. The latter was suggested to improve the former, but their actual computational and communication times have been poorly understood. This paper first presents a thorough performance evaluation of the two protocols based on analytical analysis and queueing network models. As shown, PKTAPP does not scale better than PKCROSS. Then, this paper gives a new public key cryptography-based group authentication technique. We show that the new technique can achieve better scalability than PKCORSS and PKTAPP and our performance methodology is effective.http://eudl.eu/doi/10.4108/eai.15-5-2018.154770SecurityPerformance EvaluationComplexity Analysis
collection DOAJ
language English
format Article
sources DOAJ
author Kaiqi Xiong
spellingShingle Kaiqi Xiong
The performance analysis of public key cryptography-based authentication
EAI Endorsed Transactions on Security and Safety
Security
Performance Evaluation
Complexity Analysis
author_facet Kaiqi Xiong
author_sort Kaiqi Xiong
title The performance analysis of public key cryptography-based authentication
title_short The performance analysis of public key cryptography-based authentication
title_full The performance analysis of public key cryptography-based authentication
title_fullStr The performance analysis of public key cryptography-based authentication
title_full_unstemmed The performance analysis of public key cryptography-based authentication
title_sort performance analysis of public key cryptography-based authentication
publisher European Alliance for Innovation (EAI)
series EAI Endorsed Transactions on Security and Safety
issn 2032-9393
publishDate 2018-05-01
description Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA) are considered two notable techniques. The latter was suggested to improve the former, but their actual computational and communication times have been poorly understood. This paper first presents a thorough performance evaluation of the two protocols based on analytical analysis and queueing network models. As shown, PKTAPP does not scale better than PKCROSS. Then, this paper gives a new public key cryptography-based group authentication technique. We show that the new technique can achieve better scalability than PKCORSS and PKTAPP and our performance methodology is effective.
topic Security
Performance Evaluation
Complexity Analysis
url http://eudl.eu/doi/10.4108/eai.15-5-2018.154770
work_keys_str_mv AT kaiqixiong theperformanceanalysisofpublickeycryptographybasedauthentication
AT kaiqixiong performanceanalysisofpublickeycryptographybasedauthentication
_version_ 1724795799514120192