作者: Naomaru Itoi
DOI:
关键词:
摘要: The nightmare of Trusted Third Party (T3P) based protocol users is compromise the T3P. Because compromised T3P can read and modify any user information, entire group becomes vulnerable to secret revelation impersonation. Kerberos, one most widely used network authentication protocols, no exception. When Kerberos Key Distribution Center (KDC) compromised, all keys are exposed, thus revealing encrypted data allowing an adversary impersonate user. If has physical access KDC host, or obtain administrator rights, possible, catastrophic. To solve this problem, demonstrate capabilities secure hardware, we have integrated IBM 4758 coprocessor into V5 KDC. As a result integration, our implemented preserves security even if host been compromised.