Downloads: 121
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015
Providing Kerberos Authentication Using Elliptic Curve Cryptography
Monalisha Mishra | G. Sujatha [4]
Abstract: KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.
Keywords: authentication-Kerberos, Public key cryptography, Elliptic curve cryptography, PKINIT, PKCROSS, PKTAPP
Edition: Volume 4 Issue 3, March 2015,
Pages: 689 - 692
Similar Articles with Keyword 'Public key cryptography'
Downloads: 109
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1285 - 1288Key Aggregate Cryptosystem for Data Sharing in Cloud Computing
Rohit Tate | Jyoti Pingalkar
Downloads: 116
Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014
Pages: 2120 - 2124Verifier Based Prevention for an Offline Password Guessing Attack Using ECC
Radhika L. Bhosale | Manoj L. Bangare