Title :
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type Analysis with RC-4 Encryption
Author :
Shukla, Piyush Kumar ; Mishra, G.S. ; Girdhar, P.G. ; Rusia, Pradeep ; Kapoor, Vivek
Author_Institution :
RGPV, UIT, Bhopal
Abstract :
In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods that when combined together, can reduce the time needed to crack a password redused over brute force and will propose scheme how that time can reduce more. The first method uses known text in the pre authentication phase to skip the verification section of the decryption process. The second method pre computes some of the steps of the RC5-HMAC decryption process.
Keywords :
cryptography; Kerberos passwords; RC-5 encryption type analysis; RC5-HMAC decryption process; Authentication; Cryptography; Data security; Dictionaries; Force control; Hardware; Information analysis; Information technology; Protocols; Software algorithms; AS; Client; Kerberos; RC-5; TGS;
Conference_Titel :
Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-3770-2
Electronic_ISBN :
978-0-7695-3596-8
DOI :
10.1109/ITNG.2009.304