DocumentCode :
2000963
Title :
Implementation Comparison of  Kerberos Passwords by RC-5 Encryption Type Analysis with  RC-4 Encryption
Author :
Shukla, Piyush Kumar ; Mishra, G.S. ; Girdhar, P.G. ; Rusia, Pradeep ; Kapoor, Vivek
Author_Institution :
RGPV, UIT, Bhopal
fYear :
2009
fDate :
27-29 April 2009
Firstpage :
1581
Lastpage :
1582
Abstract :
In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods that when combined together, can reduce the time needed to crack a password redused over brute force and will propose scheme how that time can reduce more. The first method uses known text in the pre authentication phase to skip the verification section of the decryption process. The second method pre computes some of the steps of the RC5-HMAC decryption process.
Keywords :
cryptography; Kerberos passwords; RC-5 encryption type analysis; RC5-HMAC decryption process; Authentication; Cryptography; Data security; Dictionaries; Force control; Hardware; Information analysis; Information technology; Protocols; Software algorithms; AS; Client; Kerberos; RC-5; TGS;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-3770-2
Electronic_ISBN :
978-0-7695-3596-8
Type :
conf
DOI :
10.1109/ITNG.2009.304
Filename :
5070857
Link To Document :
بازگشت