Academic Journals Database
Disseminating quality controlled scientific knowledge

Comparative study of various PKINIT methods used in Advanced Kerberos

Author(s): Shital S. Thorat, | H. K. Sawant, | Sarita S. Gaikwad, | G. T. Chavan

Journal: International Journal on Computer Science and Engineering
ISSN 0975-3397

Volume: 2;
Issue: 7;
Start page: 2337;
Date: 2010;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Authentication Server | Ticket-Granting Server | Ticket Granting Ticket | Ticket-Granting Service Request | Ticket-Granting Service Response | Authentication Service Request | Authentication Service Response | Application Request | Application Reply | Public key cryptography for initial authentication | Extensible Pre- Authentication in Kerberos | Key Distribution Center | Kerberos Authentication Server. Data Encryption Standard | Certificate Revocation List | Online Certificate Status Protocol Services

Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used as a solution to these network security problems. The Kerberos protocol with public key cryptography may help client to prove its identity to a server (and vice-versa) across an insecurenetwork connection. This paper shows comparative study of various PKINIT methods used in Kerberos with their results.
Affiliate Program     

Tango Rapperswil
Tango Rapperswil