An Authentication Protocol based on Kerberos

Abstract

In this paper a single-sign-on authentication protocol has been proposed. The protocol is a derivative of the Kerberos protocol that uses one server for authentication purposes, except that it is simpler in its’ implementation. Nonces and time-stamps are used to prevent replay attacks. The encryption schemes are all based on symmetric key cryptography. The protocol also is not susceptible to reflection attacks. The paper discusses the working of the protocol and analyses the strengths and weaknesses of the same.

Authors and Affiliations

Jayati Ghosh Dastidar

Keywords

Related Articles

A Modified Differential Evolution Algorithm to Optimize the Design of Gas Transmission Network

A modified Differential Evolution (DE) is used in optimization of a gas transmission network. The goal is to reduce the annual operating and maintenance costs by optimizing many network parameters such as the number of c...

Preparation and characterization of Al doped nano crystalline Ni ferrites

The Ni-Al nano ferrites having compositional formula NiAlxFe2-xO4 (where x= 0.2, 0.4, 0.6, and 0.8) were synthesized by citrate gel auto combustion method. The XRD studies reflected that the fabricated powders were singl...

Distance Calculation for Underground Cable Fault Using Iot

The underground cable system is a common practice followed in many urban areas. While a fault occurs for some reason, at that time the repairing process related to that particular cable is difficult due to not knowing th...

Application Of Data Mining In Bioinformatics

With the widespread use of databases and the explosive growth in their sizes, there is a need to effectively utilize these massive volumes of data. This is where data mining comes in handy, as it scours the databases for...

Caline–4 Model Validation in the Nearfield of Bahadur Shah Zafar Marg, New Delhi, India

Rapid growth in the number of vehicles and vehicle activity makes this particularly true in cities in developing countries. It is generated due to incomplete combustion of the fuel in automobiles. It is observed to be as...

Download PDF file
  • EP ID EP391587
  • DOI 10.9790/9622-0707047074.
  • Views 108
  • Downloads 0

How To Cite

Jayati Ghosh Dastidar (2017). An Authentication Protocol based on Kerberos. International Journal of engineering Research and Applications, 7(7), 70-74. https://europub.co.uk/articles/-A-391587