ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IMPLEMENTATION ON PUBLIC KEY CRYPTOGRAPHY AND LOCATION BASED AUTHENTICATION FOR KERBEROS AUTHENTICATION PROTOCOL

Journal: International Education and Research Journal (Vol.2, No. 4)

Publication Date:

Authors : ;

Page : 88-89

Keywords : Authentication; Kerberos; public-key cryptography; PKINIT; PKCROSS; PKTAPP;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Kerberos is one of the advanced security system that helps prevent people from stealing information that gets sent across the network from one computer to another. Usually, these people are after your password. The Kerberos security system, guards electronic transmissions that get sent across the Internet. It does this by scrambling the information -- encrypting it -- so that only the computer that is supposed to receive the information can unscramble it, or say decrypt it. In addition, it makes sure that your password itself never gets sent across the wire: only a scrambled "key" to your password. To make a certain addition to the Kerberos Protocol we add the public key Cryptography for the phases of the Kerberos Authentication System. This would help in a more secure and a password attack free system. There would also be addition of the current location of the user requesting the service to the Data provided by the user which would add to more authentication and security.

Last modified: 2022-04-19 20:41:12