Further Improvements to the Kerberos Timed Authentication Protocol

被引:0
|
作者
Kirsal, Y. [1 ]
Gemikonakli, O. [1 ]
机构
[1] Middlesex Univ, London NW4 4BT, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, at times, well-equipped intruders succeed in breaking encryption and compromising data integrity, confidentiality and trust. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves temporary interruption to link/server access with a new authentication protocol that delays the decryption with timed authentication. The analysis and verification of authentication properties and results of the designed protocol arc presented.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
  • [1] Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
    Kirsal, Yoney
    Gemikonakli, Orhan
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 56 - 63
  • [2] An Optimized Kerberos Authentication Protocol
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 508 - +
  • [3] A Network Authentication Protocol Based on Kerberos
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
  • [4] Improving Kerberos Security through the Combined Use of the Timed Authentication Protocol and Frequent Key Renewal
    Kirsal, Y.
    Gemikonakli, O.
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 153 - +
  • [5] Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions
    Kirsal-Ever, Yoney
    Eneh, Agozie
    Gemikonakli, Orhan
    Mostarda, Leonardo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4604 - 4623
  • [6] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [7] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [8] A New Pre-authentication Protocol in Kerberos 5: Biometric Authentication
    Hoa Quoc Le
    Hung Phuoc Truong
    Hoang Thien Van
    Thai Hoang Le
    2015 IEEE RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES - RESEARCH, INNOVATION, AND VISION FOR THE FUTURE (RIVF), 2015, : 157 - 162
  • [9] Modification on Kerberos authentication protocol in grid computing environment
    Chen, R
    Gui, YD
    Gao, J
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1079 - 1082
  • [10] ONE THREE-POINT AUTHENTICATION PROTOCOL BASE ON KERBEROS PROTOCOL
    Ling Yun
    Jin Yun-Shuai
    Zhou Zong-He
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1245 - 1251