IMPLEMENTATION ON PUBLIC KEY CRYPTOGRAPHY AND LOCATION BASED AUTHENTICATION FOR KERBEROS AUTHENTICATION PROTOCOL
Keywords:Authentication, Kerberos, public-key cryptography, PKINIT, PKCROSS, PKTAPP
Kerberos is one of the advanced security system that helps prevent people from stealing information that gets sent across the network from one computer to another. Usually, these people are after your password. The Kerberos security system, guards electronic transmissions that get sent across the Internet. It does this by scrambling the information -- encrypting it -- so that only the computer that is supposed to receive the information can unscramble it, or say decrypt it. In addition, it makes sure that your password itself never gets sent across the wire: only a scrambled "key" to your password. To make a certain addition to the Kerberos Protocol we add the public key Cryptography for the phases of the Kerberos Authentication System. This would help in a more secure and a password attack free system. There would also be addition of the current location of the user requesting the service to the Data provided by the user which would add to more authentication and security.
B. Clifford Neuman and Theodore Ts‘o, “Kerberos: An Authentication Service for Computer Networks”, IEEE communication magazine, (Sept 1994)
Qin Li Fan Yang, Huibiao Zhu and Longfei Zhu, “Formal Modeling and Analyzing Kerberos Protocol”, (2009)
Farhana S. Munnee, AnirudhJonnavitula, “Kerberos using public Key Cryptography”, GMU-ECE 646 Fall 2007
J. Kohl, and C. Neuman, “The Kerberos network authentication service (V5),” RFC 1510. September 1993.
L. Zhu B. Tung, “Public Key Cryptography for Initial Authentication in Kerberos (PKINIT),”RFC 4556.
Cryptography and Network Security by William Stallings (Fourth Edition) www.mit.edu/kerberos/
How to Cite
Copyright (c) 2021 International Education and Research Journal (IERJ)
This work is licensed under a Creative Commons Attribution 4.0 International License.