A Formal Analysis and Some Properties of Kerberos in Network Security
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1697Abstract
Network is a chain, a weak link in that can break a system. Network plays a vital role in modern computer industry. Making secure network is more important because a lot of confidential transactions are performed over the network. In this world of universal electronic connectivity “Hackers” threaten the prosperity and productivity of individuals and corporations, to prevent that we introduce a new type of security with KERBEROS. This paper deals with networking in a most secured manner. In this advanced Hacking world network security seems to be more important and it plays a vital role in communication over networks. This is made possible by using the KERBEROS, the best way of implementing the network security.
References
Jaiganesh, M.; Ramdoss, B.; P.S.N.A. Coll. of Eng. & Technol., Dindigul Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on 18-20 Dec. 2008 ,1 - 7 ,St. Thomas, VI ,ISBN: 978-1-4244-3594-4 ,24 February 2009.
Raluca, C.; Monica, B.; Electronics and Telecommunications (ISETC), 2010 9th International Symposium on 11-12 Nov. 2010 ,237 - 240 ,Timisoara ,ISBN: 978-1-4244-8457-7 ,06 January 2011
S. M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Proceedings of the Winter 1991 Usenix Conference. January 1991.
B. Clifford Neuman and Stuart G. Stubblebine. A Note on the Use of Timestamps as Nonces. Operating Systems Review, 27(2):10-14, April 1993. (unrefereed)
T. Wu, “A Real-World Analysis of Kerberos Password Security”, in Proceedings of the 1999 Internet Society Network and Distributed System Security Symposium, San Diego, CA, Feb 1999. Pdf. presentation.
K. Hildrum (UC Berkeley, UNITED STATES), Security of Encrypted rlogin Connections Created With Kerberos IV [Paper], [Overview], NDSS 2000.
S. Josefsson. On Active Attacks to Kerberos Telnet, August 2001, unpublished.
F. Butler, I. Cervesato, A. Jaggard, A. Scedrov. In: S. Schneider, ed.,A formal analysis of some properties of Kerberos 5 using MSR, , “15-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2002”, IEEE Computer Society Press, 2002, pp. 175-190.
Raluca, C.; Monica, B.; Electronics and Telecommunications (ISETC), 2010 9th International Symposium on 11-12 Nov. 2010 ,237 - 240 ,Timisoara ,ISBN: 978-1-4244-8457-7 ,06 January 2011
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.