International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015

Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra, G. Sujatha

KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.

Keywords: authentication-Kerberos, Public key cryptography, Elliptic curve cryptography, PKINIT, PKCROSS, PKTAPP

Edition: Volume 4 Issue 3, March 2015

Pages: 689 - 692


How to Cite this Article?

Monalisha Mishra, G. Sujatha, "Providing Kerberos Authentication Using Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152045, Volume 4 Issue 3, March 2015, 689 - 692

35 PDF Views | 36 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Public key cryptography'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1285 - 1288

Key Aggregate Cryptosystem for Data Sharing in Cloud Computing

Rohit Tate, Jyoti Pingalkar

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 689 - 692

Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra, G. Sujatha

Share this article



Similar Articles with Keyword 'Elliptic curve cryptography'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 689 - 692

Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra, G. Sujatha

Share this article

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi

Share this article
Top