International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

The major problem addressed in accessing storage devices in parallel Network File System (pNFS) is the generation of key for many to many communication safely and securely.Normally, pNFS uses Kerberos based key exchange authentication protocol for the establishment of key which have some limitations such as the problem of scalability, key escrow, forward secrecy. This paper proposes authenticated key exchange protocol names as password prestidigitation protocol that overcome the limitations of existing Kerberos based protocol.

Keywords: NFS, pNFS, Kerberos, LIPKEY, key escrow, forward secrecy, password prestidigitation

Edition: Volume 6 Issue 6, June 2017

Pages: 2502 - 2506


How to Cite this Article?

Anila P, Prajeesh C B, "Password Prestidigitation for Key Exchange Authentication Protocol", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174303, Volume 6 Issue 6, June 2017, 2502 - 2506

17 PDF Views | 13 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'NFS'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 82 - 84

An Efficient Approach towards File Storage and Sharing in Network

Anil Bharat Ahir, Hira Namdev Rakhunde

Share this article

Similar Articles with Keyword 'pNFS'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

Similar Articles with Keyword 'Kerberos'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1235 - 1239

Kerberos as a Service in Cloud Computing Security Issues

Y. Shashank Rao, Dr. N. Chandra Sekhar Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1038 - 1040

A Survey Paper on Federated Access to Kerberized Services in the Eduroam Network

Mahesh S. Tambe, S. K. Pathan

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1937 - 1942

Achieving Data Confidentiality and Authentication in Cloud Computing

Abhilash S Nath, Reshna T

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1082 - 1087

Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud

Basant Kumar Gupta, Kalicharan Sahu

Share this article

Similar Articles with Keyword 'LIPKEY'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

Similar Articles with Keyword 'key escrow'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this article

Similar Articles with Keyword 'forward secrecy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Top