Proceedings of INFOCOM '97
DOI: 10.1109/infcom.1997.644526
|View full text |Cite
|
Sign up to set email alerts
|

Scalability and flexibility in authentication services: the KryptoKnight approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…The server can then decrypt the oreo, verify its authenticity and use the resulting key for generating MACs and verifying MACs received from the client. We note that given the stateless nature of web servers the idea of keeping state at users has been suggested before (perhaps for the first time in [12]), and is typically used for providing the server with encrypted keys/states in cookies, for the server to restore keys and common state. We describe the protocol below.…”
Section: The Protocolmentioning
confidence: 99%
“…The server can then decrypt the oreo, verify its authenticity and use the resulting key for generating MACs and verifying MACs received from the client. We note that given the stateless nature of web servers the idea of keeping state at users has been suggested before (perhaps for the first time in [12]), and is typically used for providing the server with encrypted keys/states in cookies, for the server to restore keys and common state. We describe the protocol below.…”
Section: The Protocolmentioning
confidence: 99%
“…Cookie-based solutions [36] were used against TCP connection-depletion (also known as TCP SYN) attacks [45,23], and in security protocols such as Photuris [32], IKE [22], JFK [2], and others [39,24]. More generally, The advantages of being stateless, at least in the beginning of a protocol run, were recognized in the context of security protocols in [27] and [4].…”
Section: Related Work On Puzzlesmentioning
confidence: 99%
“…Various recommendations on protocol design include use of client puzzles [23,3], stateless cookies [39], forcing clients to store server state, rearranging the order of computations in a protocol [18], and the use of a formal method framework for analyzing the properties of protocols with respect to DoS attacks [35]. The advantages of being stateless, at least in the beginning of a protocol run, were recognized in the security protocol context in [22] and [2]. The latter presented a 3-message version of IKE, similar to JFK, that did not provide the same level of DoS protection as JFK does, and had no identity protection.…”
Section: Internet Key Exchange (Ike)mentioning
confidence: 99%