An Authentication Protocol based on Kerberos

Abstract

In this paper a single-sign-on authentication protocol has been proposed. The protocol is a derivative of the Kerberos protocol that uses one server for authentication purposes, except that it is simpler in its’ implementation. Nonces and time-stamps are used to prevent replay attacks. The encryption schemes are all based on symmetric key cryptography. The protocol also is not susceptible to reflection attacks. The paper discusses the working of the protocol and analyses the strengths and weaknesses of the same.

Authors and Affiliations

Jayati Ghosh Dastidar

Keywords

Related Articles

The third example of Newton’s Third Law leads to inconsistent results i.e. mass becomes infinite and imaginary.

Objective: Newton gave three examples to explain illustrate the law after definition. The first two examples, a stone is pushed by finger or a stone is pulled by horse. Their critical study leads to inconsistent study. M...

Biotechnological Innovations and Medicinal Plants of Agriculture in the Brazilian Amazon

The fundamental aim of this research is to establish an analysis with regard to non-sustainable economic models to the environment, also known as Business as Usual, and as an alternative proposal sustainable ecosystem mo...

Intelligent Automatic Vehicle Accident Detection and Prevention System

Ever increasing number of fatal traffic accidents around the world can be significantly reduced if modern technology is incorporated within the automobile to access the physical conditions of the driver at regular interv...

Estimation of seasonal salt balance in soil water of Siwa Oasis closed basin, Western Desert, Egypt

Salinity of soil water problem in closed basins is so vital to water and soil. Siwa Oasis suffers from serious soil-water salinization and water logging problems. During the last four decades, more trials were carried ou...

Building Future with Recycled Aggregate

India is presently generating construction and demolition (C & D) waste around 23.75 million tons annually and these figures are likely to double fold in the next 7 years. C & D waste and specifically concrete has been s...

Download PDF file
  • EP ID EP391587
  • DOI 10.9790/9622-0707047074.
  • Views 116
  • Downloads 0

How To Cite

Jayati Ghosh Dastidar (2017). An Authentication Protocol based on Kerberos. International Journal of engineering Research and Applications, 7(7), 70-74. https://europub.co.uk/articles/-A-391587