Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015
Providing Kerberos Authentication Using Elliptic Curve Cryptography
Monalisha Mishra | G. Sujatha 
Abstract: KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.
Keywords: authentication-Kerberos, Public key cryptography, Elliptic curve cryptography, PKINIT, PKCROSS, PKTAPP
Edition: Volume 4 Issue 3, March 2015,
Pages: 689 - 692
How to Cite this Article?
Monalisha Mishra, G. Sujatha, "Providing Kerberos Authentication Using Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 689-692, https://www.ijsr.net/get_abstract.php?paper_id=SUB152045
How to Share this Article?
Similar Articles with Keyword 'Public key cryptography'
Key Aggregate Cryptosystem for Data Sharing in Cloud Computing
Rohit Tate | Jyoti Pingalkar
Verifier Based Prevention for an Offline Password Guessing Attack Using ECC
Radhika L. Bhosale | Manoj L. Bangare