KERBEROS SECURITY EVALUATION

  • Mahdi H
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. A common methodology depends on the national standardizations is used to evaluate security of that authentication scenarios of  Kerberos protocol.

Cite

CITATION STYLE

APA

Mahdi, H. (2008). KERBEROS SECURITY EVALUATION. Diyala Journal of Engineering Sciences, 1(1), 152–163. https://doi.org/10.24237/djes.2008.01111

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free