Providing Kerberos Authentication Using Elliptic Curve Cryptography
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
KERBEROS is a key distribution and user authentication service developed at MIT. Kerberos can be described as a trusted third-party authentication system. After a user authenticates with Kerberos, their communications can be encrypted to assure privacy and data integrity. The public key based protocols PKINIT, PKCROSS and PKTAPP help in implementing public key cryptography in different stages of Kerberos framework. The PKINIT extension provides a method for integrating public key cryptography into the initial authentication exchange, by using asymmetric-key encryption algorithm in pre authentication data fields. PKCROSS has been proposed to simplify the administrative burden of maintaining cross realm keys so that it improves the scalability of Kerberos in large multi realm networks. Finally PKTAPP has been proposed to improve the scalability of PKCROSS. The aim of this project is to study the implementation of these Kerberos protocols through a real time application system. In this paper we report how Elliptic curve cryptography provides a strong security by using smaller key size, as well as decreases the memory size and CPU time as compared to other algorithms.
Synthesis and Characterization of Zinc Oxide Nanowires by Electro-Deposition Method
This paper present a review of current research activities of ZnO nanorods (or nanowires, nanotubes). We synthesized ZnO nanowire via template method by the process of Electro deposition. For synthesis of one dimensional...
Study the Factors Affecting the Quality Assurance of Superficial RadiotherapyX-RayMachine
The aim of this study was to analyze factors influencing the quality assurance of superficial radiotherapy X-ray machine such as dose output reproducibility, linearity, kV accuracy, time accuracy. Moreover the entrance s...
Knowledge and Practices regarding Advanced Patient Care among Staff Nurses Working in a Tertiary Care Hospital
The nursing profession has been touted as a way of improving quality of health care. OBJECTIVES:To assess the knowledge and practices of advanced patient care, correlation between knowledge and practice among staff nurs...
Performance Analysis of DFIG based Wind Energy Conversion System Using Direct Power Controller
"Abstract – In this paper, Direct Power Control (DPC) is introduced for the DFIG based wind energy conversion systems under distorted conditions. DFIG is very sensitive to grid disturbances and it experiences many proble...
VILEEAR: Detection of Drive by Download attack on Malicious Web Pages
Internet is a platform which is mostly used to spread malicious software and viruses on the network. The drive by download (DBD) is most successful and popular attack invented by web site attacker till date. Drive by do...