skip to main content
article
Free Access

The Yaksha security system

Authors Info & Claims
Published:01 March 1996Publication History
First page image

References

  1. 1 Boyd, C. Digital Multisignatures, Cryptography and Coding. Clarendon Press, Oxford, 1989. H.J. Beker and F.C. Piper, Eds.]]Google ScholarGoogle Scholar
  2. 2 Denning, D. To tap or not to tap. Commun. ACM 36, 3 (Mar. 1993).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Denning, D., and Branstad, D. A taxonomy for key-escrow encryption systems. Connmun. ACM 39, 3 (Mar. 1996).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Ganesan, R. Yaksha: Augmenting Kerberos with public-key cryptography. In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, (Feb.) 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Ganesan, R., and Yacobi, Y. A secure joint signature and key exchange system. Bellcore TM-24531, Oct. 1994.]]Google ScholarGoogle Scholar
  6. 6 Kent, S. Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, Internet RFC 1422, Feb. 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Needham, R.M., and Schroeder, M.D. Using encryption for authentication in large networks of computers. Commun. ACM 21, I2 (Dec. 1978).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Neuman, B.C., and Ts'o, T. Kerberos: An authentication service for computer networks. IEEE Commun. (Sept. 1994).]]Google ScholarGoogle Scholar
  9. 9 Rivest, R., Shamir, A., and Adelman, L. On digital signatures and public-key cryptography. Commun. ACM 27, 7 (July 1978).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Schneier, B. Applied Cuptography: Protocols, Algorithms and Source Code in C. Wiley, New York, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Yaksha security system

        Recommendations

        Reviews

        Judy Marian Myerson

        The basic purpose of this paper is twofold. First, it shows that the Yaksha security system is a single security infrastructure that can provide multiple security functions, such as authentication, digital signature, and key exchange. Second, it describes how the system can be used for key escrow. It fulfills its purpose by presenting a summary of key design requirements and solutions for escrow problems. “Two commonly accepted requirements essentially define key escrow systems. The system should provide an authority [such as government or a corporate organization] the ability to access encrypted information without the cooperation of the participants. The backdoor inherent in the system should not be usable by an unauthorized third party.” After describing the general Yaksha system, the paper proceeds to a brief discussion of how three very different key escrow problems can be solved using the same Yaksha infrastructure. Telephony, email, and encrypted data storage are example applications. The best features of the paper are the note at the top of the first page explaining what the Yaksha security infrastructure is, and the first paragraph, on what Yakshas are in Hindu mythology. However, the paper fails to provide a sidebar on the first page to briefly explain that the Yaksha system is a variant of the RSA public-key cryptosystem. The references are adequate. Overall, the paper opens a door to further discussion on single security infrastructures .

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 39, Issue 3
          March 1996
          89 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/227234
          Issue’s Table of Contents

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader