We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center saves a profile for every instance in its realm to generate the principle's secret-key by hashing the profile, and encrypting the output digest. Besides, the lifetime of the secret-key is controlled using the sys-tem clock. Triple-Des is used for encryption, SHA-256 for hashing, and Blum Blum Shub for random number gen-eration.
CITATION STYLE
El-Emam, E., Koutb, M., Kelash, H., & Faragallah, O. S. (2011). An authentication protocol based on kerberos 5. International Journal of Network Security, 12(3), 159–170. https://doi.org/10.9790/9622-0707047074
Mendeley helps you to discover research relevant for your work.