Further Improvements to the Kerberos Timed Authentication Protocol

被引:0
|
作者
Kirsal, Y. [1 ]
Gemikonakli, O. [1 ]
机构
[1] Middlesex Univ, London NW4 4BT, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication mechanisms coupled with strong encryption techniques are used for security purposes; however, at times, well-equipped intruders succeed in breaking encryption and compromising data integrity, confidentiality and trust. Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves temporary interruption to link/server access with a new authentication protocol that delays the decryption with timed authentication. The analysis and verification of authentication properties and results of the designed protocol arc presented.
引用
收藏
页码:549 / 554
页数:6
相关论文
共 50 条
  • [21] Improvement in the Kerberos protocol
    Wang, Guo-bing
    Yang, Jian-zhan
    Xie, Gui
    Wuhan Daxue Xuebao/Journal of Wuhan University, 1999, 45 (03): : 307 - 310
  • [22] Improvements to Mitchell's remote user authentication protocol
    Goyal, Vipul
    Jain, Abhishek
    Quisquater, Jean Jacques
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 69 - 80
  • [23] EAP-Kerberos II: An Adaptation of Kerberos to EAP for Mutual Authentication
    Eum, Sung-Hyun
    Choi, Hyoung-Kee
    2008 8TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS, PROCEEDINGS, 2008, : 78 - 83
  • [24] Verification of RabbitMQ with Kerberos Using Timed Automata
    Li, Ran
    Yin, Jiaqi
    Zhu, Huibiao
    Phan Cong Vinh
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 2049 - 2067
  • [25] Extensible pre-authentication in Kerberos
    Hellewell, Phillip L.
    van der Horst, Timothy W.
    Seamons, Kent E.
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 201 - 210
  • [26] Verification of RabbitMQ with Kerberos Using Timed Automata
    Ran Li
    Jiaqi Yin
    Huibiao Zhu
    Phan Cong Vinh
    Mobile Networks and Applications, 2022, 27 : 2049 - 2067
  • [27] QDP Authentication system over Kerberos
    Abbaspour, Daryoush Naghneh
    Sabeeh, Ahmed A.
    Lasrkari, Arash Habibi
    Saba, Amirreza
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 80 - +
  • [29] Kerberos based authentication for multiple clouds
    College of Information Science and Engineering, Hunan University, Changsha, China
    J. Comput. Inf. Syst., 11 (4065-4077):
  • [30] Verifying confidentiality and authentication in Kerberos 5
    Butler, F
    Cervesato, I
    Jaggard, AD
    Scedrov, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 1 - 24