• DocumentCode
    2000963
  • Title

    Implementation Comparison of  Kerberos Passwords by RC-5 Encryption Type Analysis with  RC-4 Encryption

  • Author

    Shukla, Piyush Kumar ; Mishra, G.S. ; Girdhar, P.G. ; Rusia, Pradeep ; Kapoor, Vivek

  • Author_Institution
    RGPV, UIT, Bhopal
  • fYear
    2009
  • fDate
    27-29 April 2009
  • Firstpage
    1581
  • Lastpage
    1582
  • Abstract
    In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods that when combined together, can reduce the time needed to crack a password redused over brute force and will propose scheme how that time can reduce more. The first method uses known text in the pre authentication phase to skip the verification section of the decryption process. The second method pre computes some of the steps of the RC5-HMAC decryption process.
  • Keywords
    cryptography; Kerberos passwords; RC-5 encryption type analysis; RC5-HMAC decryption process; Authentication; Cryptography; Data security; Dictionaries; Force control; Hardware; Information analysis; Information technology; Protocols; Software algorithms; AS; Client; Kerberos; RC-5; TGS;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-4244-3770-2
  • Electronic_ISBN
    978-0-7695-3596-8
  • Type

    conf

  • DOI
    10.1109/ITNG.2009.304
  • Filename
    5070857