The performance analysis of public key cryptography-based authentication
Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authenticati...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2018-05-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/eai.15-5-2018.154770 |
id |
doaj-5aa9be896bb94120af39a8b9ff04028a |
---|---|
record_format |
Article |
spelling |
doaj-5aa9be896bb94120af39a8b9ff04028a2020-11-25T02:37:16ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932018-05-0141411510.4108/eai.15-5-2018.154770The performance analysis of public key cryptography-based authenticationKaiqi Xiong0University of South Florida, Tampa, Florida 33620, USA; xiongk@usf.eduSeveral Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA) are considered two notable techniques. The latter was suggested to improve the former, but their actual computational and communication times have been poorly understood. This paper first presents a thorough performance evaluation of the two protocols based on analytical analysis and queueing network models. As shown, PKTAPP does not scale better than PKCROSS. Then, this paper gives a new public key cryptography-based group authentication technique. We show that the new technique can achieve better scalability than PKCORSS and PKTAPP and our performance methodology is effective.http://eudl.eu/doi/10.4108/eai.15-5-2018.154770SecurityPerformance EvaluationComplexity Analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kaiqi Xiong |
spellingShingle |
Kaiqi Xiong The performance analysis of public key cryptography-based authentication EAI Endorsed Transactions on Security and Safety Security Performance Evaluation Complexity Analysis |
author_facet |
Kaiqi Xiong |
author_sort |
Kaiqi Xiong |
title |
The performance analysis of public key cryptography-based authentication |
title_short |
The performance analysis of public key cryptography-based authentication |
title_full |
The performance analysis of public key cryptography-based authentication |
title_fullStr |
The performance analysis of public key cryptography-based authentication |
title_full_unstemmed |
The performance analysis of public key cryptography-based authentication |
title_sort |
performance analysis of public key cryptography-based authentication |
publisher |
European Alliance for Innovation (EAI) |
series |
EAI Endorsed Transactions on Security and Safety |
issn |
2032-9393 |
publishDate |
2018-05-01 |
description |
Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public Key Cryptography for Cross-Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA) are considered two notable techniques. The latter was suggested to improve the former, but their actual computational and communication times have been poorly understood. This paper first presents a thorough performance evaluation of the two protocols based on analytical analysis and queueing network models. As shown, PKTAPP does not scale better than PKCROSS. Then, this paper gives a new public key cryptography-based group authentication technique. We show that the new technique can achieve better scalability than PKCORSS and PKTAPP and our performance methodology is effective. |
topic |
Security Performance Evaluation Complexity Analysis |
url |
http://eudl.eu/doi/10.4108/eai.15-5-2018.154770 |
work_keys_str_mv |
AT kaiqixiong theperformanceanalysisofpublickeycryptographybasedauthentication AT kaiqixiong performanceanalysisofpublickeycryptographybasedauthentication |
_version_ |
1724795799514120192 |