Reviews of computing technology: Securing network applications, Kerberos and RSA
This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.
- Research Organization:
- Westinghouse Savannah River Co., Aiken, SC (United States)
- Sponsoring Organization:
- USDOE, Washington, DC (United States)
- DOE Contract Number:
- AC09-89SR18035
- OSTI ID:
- 10175436
- Report Number(s):
- WSRC-IM--90-83-7; ON: DE92019928
- Country of Publication:
- United States
- Language:
- English
Similar Records
Kerberos authentication: The security answer for unsecured networks
Design of Kerberos modifications to FTP and TELNET
Kerberos at Fermilab: Upgrade Story
Conference
·
Thu Jun 01 00:00:00 EDT 1995
·
OSTI ID:71684
Design of Kerberos modifications to FTP and TELNET
Technical Report
·
Sun Jul 01 00:00:00 EDT 1990
·
OSTI ID:6745363
Kerberos at Fermilab: Upgrade Story
Conference
·
Wed Dec 31 23:00:00 EST 2014
·
OSTI ID:1469004