An Authentication Protocol Based on Kerberos 5

Download Now
Provided by: International Journal of Network Security
Topic: Security
Format: PDF
The authors introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos distribution center saves a profile for every instance in its realm to generate the principle's secret-key by hashing the profile and encrypting the output digest. Besides, the lifetime of the secret-key is controlled using the system clock.
Download Now

Find By Topic