Comparative study of various PKINIT methods used in Advanced Kerberos

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7

Abstract

Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used as a solution to these network security problems. The Kerberos protocol with public key cryptography may help client to prove its identity to a server (and vice-versa) across an insecure network connection. This paper shows comparative study of various PKINIT methods used in Kerberos with their results.

Authors and Affiliations

Ms. Shital S. Thorat , Prof. H. K. Sawant , Mrs. Sarita S. Gaikwad , Prof. G. T. Chavan

Keywords

Related Articles

Security Enhancement of Dynamic System Using PID Controller and Optimization Algorithm

This paper presents a research project on a dynamic system by using a controller known as PID Controller, used to provide the simplest and yet effective solutions to most of the control engineering applications today [4]...

Regression and ARIMA hybrid model for new bug prediction

A multiple linear regression and ARIMA hybrid model is proposed for new bug prediction depending upon resolved bugs and other available parameters of the open source software bug report. Analysis of last five year bug r...

IP Address Blocking System

Hosting a site on the Internet makes it available everywhere. There are certain sites that are just meant for local use like local shopping marts that do not provide products for purchase in other countries. Also, there...

Task Scheduling Algorithm to Reduce the Number of Processors using Merge Conditions

Some task scheduling algorithms generate the shortest schedule, when its input DAG satisfies a specified condition. Among those scheduling algorithms, TDS algorithm proposed a DAG condition where allocation of two parent...

Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification

The phylogenomic classification of protein sequences attempts to categorize a given protein within the evolutionary context of the entire family. It involves mainly four steps: selection of homologous sequences, multiple...

Download PDF file
  • EP ID EP102730
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Ms. Shital S. Thorat, Prof. H. K. Sawant, Mrs. Sarita S. Gaikwad, Prof. G. T. Chavan (2010). Comparative study of various PKINIT methods used in Advanced Kerberos. International Journal on Computer Science and Engineering, 2(7), 2337-2344. https://www.europub.co.uk/articles/-A-102730