Reducing the Proliferation of Passwords in Distributed Systems

Remote commercial applications like databases, telebanking, electronic mail systems run security mechanisms based on passwords. Too many passwords per user become a security problem. The goal of this research is to design systems allowing "password-less" user access to network services while improving the security of existing password mechanisms. A system relying on one primary login with one password is proposed. A "guard" functionality on the user login host's side relays the application service suppliers' password requests to a password server which satisfies these requests with strong "machine" passwords. To the user, this system appears to be password-less. Application providers do not have to give up their current password security. Variations of this architecture and its protocols for three levels of increasing security are described, employing complete message traffic encryption, public key cryptography, trusted hardware and software and strong authentication devices like chipcards. Keyword Codes: C.2.2; D.4.6/K.6.5; C.2.4.

[1]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[6]  Jerome H. Saltzer,et al.  Reducing risks from poorly chosen keys , 1989, SOSP '89.

[7]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.