Title :
An optimized Kerberos authentication protocol
Author :
El-Emam, Eman ; Koutb, Magdy ; Kelash, Hamdy ; Allah, Osama Farag
Author_Institution :
Egyptian Space Program, Nat. Authority for Remote Sensing & Space Sci., Cairo, Egypt
Abstract :
This paper will introduce simple modifications to the database of the widely deployed Kerberos authentication protocol. The principle´s long-term secret key will be independent of the user password with the aim to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center will save a profile for every instance in the realm that it mange and the secret key will be generated based on that profile. This profile will be hashed and then, the output digest will be encrypted to generate the secret key. Besides, the lifetime of the secret key will be controlled using the system lifetime. We will use Triple-Des as an encryption algorithm, SHA-256 as a hashing algorithm, and Blum Blum Shub as a random number generator algorithm.
Keywords :
authorisation; cryptographic protocols; random number generation; Blum Blum Shub; Kerberos distribution center; SHA-256; Triple-Des encryption algorithm; hashing algorithm; optimized Kerberos authentication protocol; password guessing attacks; random number generator algorithm; secret key; Access control; Access protocols; Authentication; Authorization; Computer networks; Computer security; Control systems; Cryptography; Databases; Public key; Access control; Kerberos; authentication protocols; authorization; computer network security;
Conference_Titel :
Computer Engineering & Systems, 2009. ICCES 2009. International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-5842-4
Electronic_ISBN :
978-1-4244-5843-1
DOI :
10.1109/ICCES.2009.5383213