Providing Kerberos Authentication Using Elliptic Curve Cryptography

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.

Authors and Affiliations

Keywords

Related Articles

Clutter Reduction in Multi-Dimensional Visualization by Using Dimension Reduction

The volume of Big data is increasing in gigabytes day by day which are hard to make sense and difficult to analyze. The challenges of big data are capturing, storing, searching, sharing, analysis and visualization of the...

Clinical Profile of Childhood Neuro Cysticercosis

Neurocysticercosis (NCC) is a biological marker of poverty and underdevelopment 1. The frequency of this brain parasitic disease is probably high worldwide, as well as epilepsy; however, little is known about the natural...

Optimal Channel and Relay Assignment in OFDM-based System using AF and DF Relay Strategies

Optimal Channel and Relay Assignment in OFDM-based System using AF and DF Relay Strategies

Implementation of Highly Secured Log Management System over Cloud

A log is an assortment of record of events that happens at an organization containing systems and network. These logs are very important for any organization, as a result of log file can in a position to record all user...

New Secure and Advanced Algorithm for Stream Ciphers Extended RC4 and FPGA Implementation

RC4 is the most widely used stream ciphers uses in cryptography. A lot of modifications of RC4 cipher can be seen in open literature. This paper mainly analysis and describe the design issue of stream ciphers in Network...

Download PDF file
  • EP ID EP356997
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

(2015). Providing Kerberos Authentication Using Elliptic Curve Cryptography. UNKNOWN, 4(3), -. https://www.europub.co.uk/articles/-A-356997