Corpus ID: 35645903

Providing Kerberos Authentication Using Elliptic Curve Cryptography

@inproceedings{Mishra2015ProvidingKA,
  title={Providing Kerberos Authentication Using Elliptic Curve Cryptography},
  author={Nitin Kumar Mishra and G. Sujatha},
  year={2015}
}
KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography… Expand

References

SHOWING 1-10 OF 14 REFERENCES
Public-Key Cryptography Enabled Kerberos Authentication
TLDR
This paper aims to do this by implementing the most important public-key cryptography extension specifications to the traditional Kerberos standard which incorporate public-keys infrastructure (PKI) into the scope of underlying systems trusted by Kerbero, and performs qualitative experimental measurements on these specifications. Expand
Public-key cryptography extensions into Kerberos
TLDR
This article summarizes three different protocols for public-key enhanced Kerberos, explains the performance penalties associated with PKC, and reference qualitative results from other research which compares the response-time performance of the two fundamental approaches the authors describe forpublic-key based authentication. Expand
A Network Authentication Protocol Based on Kerberos
TLDR
The proposed authentication protocol will be independent of the user password, and overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Expand
Performance of public-key-enabled Kerberos authentication in large networks
TLDR
Close, class-switching queuing models are used to demonstrate the quantitative performance differences between PKCROSS and PKTAPP - two proposals for public-key-enabling Kerberos network authentication protocol and show that, whilePKTAPP is more efficient for authenticating to a single server, PK CROSS outperforms the simpler protocol if there are two or more remote servers per remote realm. Expand
Implementation of text based cryptosystem using Elliptic Curve Cryptography
TLDR
This paper presents the implementation of ECC by first transforming the message into an affine point on the Elliptic Curve (EC), over the finite field GF(p), and illustrates the process of encryption/decryption of a text message. Expand
Ahke “Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network
  • International Journal of Computer Science and Information Technologies,
  • 2013
Elliptic Curve Diffie - Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network ”
  • International Journal of Computer Science and Information Technologies
  • 2013
Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network
  • International Journal of Computer Science and Information Technologies
  • 2013
Research on design principle of Elliptic curve public key cryptography and its implementation.
  • International Conference on Computer Science and Service System Paper ID:
  • 2012
Elliptic curve cryptography and its application.
  • 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA)
  • 2011
...
1
2
...