International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 121

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra | G. Sujatha [4]


Abstract: KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.


Keywords: authentication-Kerberos, Public key cryptography, Elliptic curve cryptography, PKINIT, PKCROSS, PKTAPP


Edition: Volume 4 Issue 3, March 2015,


Pages: 689 - 692


How to Cite this Article?

Monalisha Mishra, G. Sujatha, "Providing Kerberos Authentication Using Elliptic Curve Cryptography", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 689-692, https://www.ijsr.net/get_abstract.php?paper_id=SUB152045

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Public key cryptography'

Downloads: 109

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1285 - 1288

Key Aggregate Cryptosystem for Data Sharing in Cloud Computing

Rohit Tate | Jyoti Pingalkar

Share this Article

Downloads: 116

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale | Manoj L. Bangare

Share this Article


Top