DocumentCode
2000963
Title
Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type Analysis with RC-4 Encryption
Author
Shukla, Piyush Kumar ; Mishra, G.S. ; Girdhar, P.G. ; Rusia, Pradeep ; Kapoor, Vivek
Author_Institution
RGPV, UIT, Bhopal
fYear
2009
fDate
27-29 April 2009
Firstpage
1581
Lastpage
1582
Abstract
In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods that when combined together, can reduce the time needed to crack a password redused over brute force and will propose scheme how that time can reduce more. The first method uses known text in the pre authentication phase to skip the verification section of the decryption process. The second method pre computes some of the steps of the RC5-HMAC decryption process.
Keywords
cryptography; Kerberos passwords; RC-5 encryption type analysis; RC5-HMAC decryption process; Authentication; Cryptography; Data security; Dictionaries; Force control; Hardware; Information analysis; Information technology; Protocols; Software algorithms; AS; Client; Kerberos; RC-5; TGS;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
Conference_Location
Las Vegas, NV
Print_ISBN
978-1-4244-3770-2
Electronic_ISBN
978-0-7695-3596-8
Type
conf
DOI
10.1109/ITNG.2009.304
Filename
5070857
Link To Document