Abstract
The Exponential Security System (TESS) developed at the European Institute for System Security is the result of an attempt to increase the security in heterogenous computer networks.
In this paper we present the cryptographic protocols in the kernel of TESS. We show how they can be used to implement access control, authentication, confidentiality protection, key exchange, digital signatures and distributed network security management.
We also look at the compatibility of TESS with existing standards, like the X.509 Directory Authentication Framework, and compare it to established systems like Kerberos. A comparison of TESS with the non-electronic “paper”-world of authentication and data exchange shows strong parallels.
Finally we give a short overview of the current state of development and availability of different TESS components.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
G. B. Agnew, R. C. Mullin, S. A. Vanstone, Improved digital signature scheme based on discrete exponentiation, Electronics Letters 26, 1990, pp. 1024–1025.
F. Bauspieß, H.-J. Knobloch, How to Keep Authenticity Alive in a Computer Network, Adv. in Cryptology-EUROCRYPT’ 89, Springer, Berlin 1990, pp. 38–46.
F. Bauspieß, SELANE-An Approach to Secure Networks, Abstracts of SECURICOM’ 90, Paris 1990.
Th. Beth, Zero-Knowledge Identification Scheme for Smart Cards, Adv. in Cryptology-EUROCRYPT’ 88, Springer, Berlin 1988, pp. 77–84.
CCITT, Recommendation X.509: The Directory-Authentication Framework, Blue Book-Melbourne 1988, Fascicle VIII.8: Data communication networks: directory, International Telecommunication Union, Geneva 1989, pp. 48–81.
D. Chaum, J. H. Evertse, J. van de Graaf, An Improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations, Adv. in Cryptology-EUROCRYPT’ 87, Springer, Berlin 1988, pp. 127–141.
W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory 22, 1976, pp. 644–654.
T. ElGamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. on Information Theory 31, 1985, pp. 469–472.
M. Girault, Self-Certified Public Keys, Adv. in Cryptology-EUROCRYPT’ 91, this volume.
C. G. Günther, Diffie-Hellman and El-Gamal Protocols with One Single Authentication Key, Adv. in Cryptology-EUROCRYPT’ 89, Springer, Verlin 1990, pp. 29–37.
P. Horster, H.-J. Knobloch, Protocols for Secure Networks, Abstracts of SECURICOM’ 91, Paris 1991.
N. Koblitz, Elliptic Curve Cryptosystems, Math. of Computation 48, 1987, pp. 203–209.
S. P. Miller, B. C. Neuman, J. I. Schiller, J. H. Saltzer, Section E.2.1: Kerberos Authentication and Authorization System, MIT Project Athena, Cambridge, Ma., 1987.
R. M. Needham, M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Comm. of the ACM 21, 1978, pp. 993–999.
A. M. Odlyzko, Discrete Logarithms in Finite Fields and their Cryptographic Significance, Adv. in Cryptology-EUROCRYPT’ 84, Springer, Berlin 1985, pp. 224–314.
S. C. Pohlig, M. E. Hellman, Am Improved Algorithm for Computing Logarithms Over GF(p) and its Cryptographic Significance, IEEE Trans. on Information Theory 24, 1978, pp. 106–110.
R. L. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. of the ACM 21, 1978, pp. 120–126.
R. L. Rivest, A. Shamir, How to Expose an Eavesdropper, Comm. of the ACM 27, 1984, pp. 393–395.
C. P. Schnorr, Efficient Identification and Signatures for Smart Cards, Adv. in Cryptology-CRYPTO’ 89, Springer, Berlin 1990, pp. 239–251.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Horster, P., Knobloch, HJ. (1991). Discrete Logarithm Based Protocols. In: Davies, D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46416-6_34
Download citation
DOI: https://doi.org/10.1007/3-540-46416-6_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54620-7
Online ISBN: 978-3-540-46416-7
eBook Packages: Springer Book Archive