Analysis and Improvement in Kerberos 5?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 1)Publication Date: 2015-01-30
Authors : Romendrapal Singh Rathore; B. L. Pal; Shiv Kumar;
Page : 120-127
Keywords : Authentication; AES-256; SHA-512; BBS&MM; Cross-Realm Authentication; Active Attack;
Abstract
Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure privacy and data integrity. We take a close look at Kerberos’s authentication technique using Secret key cryptography.. This thesis presents a Study and analyzes of existing framework model and policies for authentication services. The criteria expose the strengths and weaknesses of existing system. We have proposed a design and framework for authentication using Kerberos 5. The proposed modification in Kerberos 5 will be more Protectable from replay attack., eavesdropping, password guessing attack, differential brute force attack and more useful in Cross-realm authentication. This design and framework can be used for those who need to choose an infrastructure, knowing the Kerberos broadly. The characteristics presented here are proposed to enhance the security and efficiency of transactions in Kerberos 5 over a network.
Other Latest Articles
- Evaluation of Investment and Crediting Capacity of Agricultural Sector Enterprises
- IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING?
- Theoretical Basis of Credit Support as a Factor of Economic Growth of Agricultural Enterprises
- Leader Election Algorithms in Torus and Hypercube Networks Comparisons and Survey?
- Privacy Preserving and Secure Mining of Association Rules in Distributed Data Base
Last modified: 2015-01-14 19:37:26