A Formal Analysis and Some Properties of Kerberos in Network Security

Authors

  • R. Aghila Department of Computer Science and Engineering, KLN College of Information and Technology, Sivagangai District, India
  • K. Nagalakshmi Department of Computer Science and Engineering, KLN College of Information and Technology, Sivagangai District, India.
  • B. S. Roopan Department of Computer Science and Engineering, KLN College of Information and Technology, Sivagangai District, India.
  • S. Rajakrishnan Department of Computer Science and Engineering, KLN College of Information and Technology, Sivagangai District, India.
  • T. Anandaraj Department of Computer Science and Engineering, KLN College of Information and Technology, Sivagangai District, India.

DOI:

https://doi.org/10.51983/ajcst-2012.1.1.1697

Abstract

Network is a chain, a weak link in that can break a system. Network plays a vital role in modern computer industry. Making secure network is more important because a lot of confidential transactions are performed over the network. In this world of universal electronic connectivity “Hackers” threaten the prosperity and productivity of individuals and corporations, to prevent that we introduce a new type of security with KERBEROS. This paper deals with networking in a most secured manner. In this advanced Hacking world network security seems to be more important and it plays a vital role in communication over networks. This is made possible by using the KERBEROS, the best way of implementing the network security.

References

Jaiganesh, M.; Ramdoss, B.; P.S.N.A. Coll. of Eng. & Technol., Dindigul Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on 18-20 Dec. 2008 ,1 - 7 ,St. Thomas, VI ,ISBN: 978-1-4244-3594-4 ,24 February 2009.

Raluca, C.; Monica, B.; Electronics and Telecommunications (ISETC), 2010 9th International Symposium on 11-12 Nov. 2010 ,237 - 240 ,Timisoara ,ISBN: 978-1-4244-8457-7 ,06 January 2011

S. M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Proceedings of the Winter 1991 Usenix Conference. January 1991.

B. Clifford Neuman and Stuart G. Stubblebine. A Note on the Use of Timestamps as Nonces. Operating Systems Review, 27(2):10-14, April 1993. (unrefereed)

T. Wu, “A Real-World Analysis of Kerberos Password Security”, in Proceedings of the 1999 Internet Society Network and Distributed System Security Symposium, San Diego, CA, Feb 1999. Pdf. presentation.

K. Hildrum (UC Berkeley, UNITED STATES), Security of Encrypted rlogin Connections Created With Kerberos IV [Paper], [Overview], NDSS 2000.

S. Josefsson. On Active Attacks to Kerberos Telnet, August 2001, unpublished.

F. Butler, I. Cervesato, A. Jaggard, A. Scedrov. In: S. Schneider, ed.,A formal analysis of some properties of Kerberos 5 using MSR, , “15-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2002”, IEEE Computer Society Press, 2002, pp. 175-190.

Raluca, C.; Monica, B.; Electronics and Telecommunications (ISETC), 2010 9th International Symposium on 11-12 Nov. 2010 ,237 - 240 ,Timisoara ,ISBN: 978-1-4244-8457-7 ,06 January 2011

Downloads

Published

05-05-2012

How to Cite

Aghila, R., Nagalakshmi, K., Roopan, B. S., Rajakrishnan, S., & Anandaraj, T. (2012). A Formal Analysis and Some Properties of Kerberos in Network Security. Asian Journal of Computer Science and Technology, 1(1), 6–10. https://doi.org/10.51983/ajcst-2012.1.1.1697