Corpus ID: 212533585

Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication Protocol

@inproceedings{Thakur2015ReplayAP,
  title={Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication Protocol},
  author={T. Thakur and S. Dogra and Yamini Sood},
  year={2015}
}
Now a day computer networks are growing day by day. With this growth these networks are required to be inter connected with each other which leads to the major usage of internet. Although internet makes accessibility easier for these networks but it decrease data security i.e not acceptable by any user. Hence to increase data security we required strong cryptography in authentication protocol .Kerberos is one of the best window authentication protocols but one of the major drawback of Kerberos… Expand
Addressing the Security Issues of Kerberos Method using RAID Level 5
TLDR
A model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos. Expand
Multimodal Authentication - Biometric, Password, And Steganography
TLDR
The proposed solution is to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user. Expand

References

SHOWING 1-10 OF 34 REFERENCES
Replay Attack Prevention in Kerberos Authentication Protocol Using Triple Password
TLDR
This paper presents an improved method which prevents replay attacks and password attacks by using Triple password scheme, which helps to prevent Replay attack. Expand
An optimized Kerberos authentication protocol
TLDR
This paper will introduce simple modifications to the database of the widely deployed Kerberos authentication protocol, using Triple-Des as an encryption algorithm, SHA-256 as a hashing algorithm, and Blum Blum Shub as a random number generator algorithm. Expand
An improved Kerberos protocol based on fast RSA algorithm
  • D. Hu, Zhiguo Du
  • Computer Science
  • 2010 IEEE International Conference on Information Theory and Information Security
  • 2010
TLDR
The paper improves Kerberos by applying fast RSA algorithm, more specifically, using Montgomery algorithm to count modular exponentiation of large numbers, and adopting the Chinese Remainder Theorem when using private key to calculatefast RSA algorithm. Expand
Improvement of Kerberos protocol based on dynamic password and “One-time public key”
TLDR
The results show that the improved Kerberos protocol can ensure the security of the information and password. Expand
Kerberos: an authentication service for computer networks
TLDR
The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic. Expand
Improved Kerberos Security Protocol Evaluation using Modified BAN Logic
TLDR
This work proposes a new BAN logic based evaluation tool (N-BAN) to evaluate the N-Kerberos protocol and validates the new form of Kerberos (N) using the new forms of BAN (N)-BAN logic. Expand
Kerberos: A Network Authentication System
TLDR
This handbook is a complete step-by-step guide to working with Kerberos, one of the most popular network authentication systems used by network administrators and programmers, and covers important information for developing Kerberized applications. Expand
Public-key cryptography extensions into Kerberos
TLDR
This article summarizes three different protocols for public-key enhanced Kerberos, explains the performance penalties associated with PKC, and reference qualitative results from other research which compares the response-time performance of the two fundamental approaches the authors describe forpublic-key based authentication. Expand
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols. Expand
The Perils of Unauthenticated Encryption: Kerberos Version 4
TLDR
An efficient chosen-plaintext attack is implemented that uses this design flaw to impersonate arbitrary principals and identify corrective measures taken in the proposed revisions of the Kerberos authentication protocol, which repair these flaws. Expand
...
1
2
3
4
...