Map
Index
Random
Help
th

QuoteRef: bellSM10_1990

topics > all references > ThesaHelp: references a-b



ThesaHelp:
ACM references a-e
ThesaHelp:
references a-b
Topic:
authentication
Topic:
password protection

Reference

Bellovin, S.M., Merritt, M., "Limitations of the Kerberos Authentication System", ACM SIGCOMM Computer Communication Review, October 1990, pp. 119-132. Google

Quotations
120 ;;Quote: a security system must assume that the network is controlled by an adversary; a modified Kerberos can meet this goal
121 ;;Quote: in Kerberos, all privileges depend ultimately on the user's typed password
122 ;;Quote: if a password system runs on a multi-user workstation, cached keys are accessible to attackers
123 ;;Quote: an authentication system should be independent of a time service; Kerberos assumes that clocks are roughly synchronized; an adversary could spoof an unauthenticated time service
124 ;;Quote: challenge/response is more secure than time-based authentication; based on computing some function of a nonce
124 ;;Quote: use exponential key exchange to limit password-guessing assaults
125 ;;Quote: an intruder can replace the login command and capture passwords; avoid by challenge-response or a handheld authenticator

Related Topics up

ThesaHelp: ACM references a-e (259 items)
ThesaHelp: references a-b (396 items)
Topic: authentication (87 items)
Topic: password protection (42 items)

Collected barberCB 3/98
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.