Abstract
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a "speaks for" relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegation of authority. The theory explains how to reason about a principal's authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed mechanisms for security. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, loading programs, delegation, access control, and revocation.
- 1 M. Abad~, M. Burrows, C. Kaufman, and B Lampson. Authentication and delegation with smart-cards. To appear m Theoretical Aspects of Computer Software, Springer, 199 I. Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct. 1990.Google Scholar
- 2 M. Abadi, M. Burrows, B. Lampson, and G. Plotlon. A calculus for access control in distributed systems. To appear in Proc. Crypto '91, Springer, 1992. Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March 199 I. Google ScholarDigital Library
- 3 A. Birrell, B. Lampson. R. Needham, and M. Schroeder. Global auth~gticanon without global trust. Proc. IEEE Symposium on Securi0, and Privacy, Oakland, 1986, 223-230.Google Scholar
- 4 M Burrows, M. Abadi, and R. Needham. A logic of authentication ACM Trans. Computer Systems 8, I, Feb. 1990, 18-36. Google ScholarDigital Library
- 5 CCITT. Information processing systems -- Open systems interconnection --The directory authentication framework. CCITT I988 Recommendation X 509. Also ISO/IEC 9594-8:1989.Google Scholar
- 6 P. Comba. Exponentiatmn cryptosystems on the IBM PC. IBM Systems Journal 28, 4, 1990, 526-538 Google ScholarDigital Library
- 7 D. Davis and R. Swtck. Network security via private-key certificates. ACM Operating Systems Review 24, 4, Oct. 1990, 64-67. Google ScholarDigital Library
- 8 D. Denning. A lattice model of secure information flow. Comm. A CM 19, 5, May 1976, 236-243. Google ScholarDigital Library
- 9 Department of Defense. Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985.Google Scholar
- 10 W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Information Theory IT-22, 6, Nov. 1976, 644-654.Google ScholarDigital Library
- 11 H. Eberle, Systems Research Center, D~g~tal Equipment Corp., Palo Alto. Private communication.Google Scholar
- 12 M. Gasser, A. Goldsteln, C. Kaufman, and B. Lampson. The Digital distributed system security architecture. Proc. 12th National Computer Security Conference, NIST/NCSC, Baltimore, 1989, 305- 319.Google Scholar
- 13 M. Gasser and E. McDermott. An architecture for practical delegation in a distributed system. Proc. IEEE Symposium on Security and Privacy, Oakland, 1990, 20-30.Google ScholarCross Ref
- 14 B. Herbison. Low cost outboard cryptographic support for SILS and SP4. Proc. I3th National Computer Security Conference, NIST/NCSC, Baltimore, 1990, 286-295.Google Scholar
- 15 J. Kohl, C. Neuman, and J. Steiner. The Kerberos network authenticatmn service. Version 5, draft 3, Project Athena, MfT, Oct. 1990.Google Scholar
- 16 B. Lampson. Protection. A CM Operating Systems Review 8, 1, Jan. 1974, 18-24. Google ScholarDigital Library
- 17 J. Linn. Practical authentication for distributed systems. Proc. IEEE Symposium on Securlty and Privacy, Oakland, 1990, 31-40.Google Scholar
- 18 National Bureau of Standards. Data Encryption Standard. FIPS Pub. 46, Jan. I977.Google Scholar
- 19 R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, Dec. 1978, 993- 999. Google ScholarDigital Library
- 20 C. Neuman. Proxy-based authorizauon and accounting for distributed systems. Technical report 91-02-01, Umversity of Washington, Seattle, March 1991.Google Scholar
- 21 R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, Feb. 1978, 120-126. Google ScholarDigital Library
- 22 R. Rivest. The MD4 message digest algorithm TM 434, Laboratory for Computer Science, MIT, Oct. 1990.Google Scholar
- 23 J. Saltzer, D. Reed, and D. Clark. End-to-end arguments in system design. ACM Trans. Computer Systems 2, 4, Nov. 1984, 277-288. Google ScholarDigital Library
- 24 M. Shand, P. Bertin, and J. Vmllemin. Resource tradeoffs in fast long integer multiplication. 2rid A CM Symposium on Parallel Algorithms and Architectures, Crete, July 1990. Google ScholarDigital Library
- 25 J. Steiner, C. Neuman, and J Schiller. Kerberos: An authentication service for open network systems. Proc. Usenix Winter Conference, Usenix Associanon, Berkeley, CA, Feb. 1988, 19t-202.Google Scholar
- 26 J. Tardo and K. Alagappan. SPX. Global authentication using public key certificates. Proc. t4th National Computer Security Conference, NIST/NCSC, Baltimore, 1991.Google ScholarCross Ref
- 27 V. Voydock and S. Kent Security mechanisms in high-level network protocols. ACM Computing Surveya 15, 2, June I983, 135- t71. Google ScholarDigital Library
Index Terms
- Authentication in distributed systems: theory and practice
Recommendations
Authentication for Distributed Systems
A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity ...
Authentication in distributed systems: theory and practice
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a “speaks for” relation between principals. A simple principal either has a name or is a communication channel; a compound ...
Secure Password Authentication for Distributed Computing
Computational Intelligence and SecurityThis paper describes secure password-based authentication involving a trusted third party, while the previous secure password authentication schemes focused on authentication involving two parties who shares the password. Kerberos is a well-known ...
Comments