Kerberos中基于视觉密码和数字信封的双因素身份验证

Naman S. Khandelwal, Pariza Kamboj
{"title":"Kerberos中基于视觉密码和数字信封的双因素身份验证","authors":"Naman S. Khandelwal, Pariza Kamboj","doi":"10.1109/EESCO.2015.7253638","DOIUrl":null,"url":null,"abstract":"Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos\",\"authors\":\"Naman S. Khandelwal, Pariza Kamboj\",\"doi\":\"10.1109/EESCO.2015.7253638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.\",\"PeriodicalId\":305584,\"journal\":{\"name\":\"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EESCO.2015.7253638\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EESCO.2015.7253638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

在不设防的分布式网络中,冒充是明显的安全风险。攻击者伪装成客户端,可以非法访问服务器。为了应对这种威胁,使用了用户身份验证,这被视为网络环境中的第一道防线。最流行和广泛使用的身份验证协议是Kerberos。Kerberos是事实上的标准,用于通过受信任的第三方相互验证用户。但是这种强大的协议容易受到各种安全攻击。本文概述了Kerberos协议及其存在的安全问题。为了增强安全性和对抗安全攻击,它还描述了一种将可视化加密和数字信封的特性合并到Kerberos中的新方法。通过使用可视化加密,我们将秘密共享视为提供相互身份验证的因素之一,从而增加了一层安全性。采用数字信封的概念,将用户的私钥作为另一个身份验证因素,实现会话密钥的安全分发。因此,我们提出的方案使Kerberos协议具有高度的鲁棒性、安全性和高效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos
Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IEEE copyright and consent form IEEE copyright and consent form Neuro-Genetic and CCM based biometrical authentication through side-view of human-face A feasibility analysis of decentralized solar power using RETScreen in Odisha Scanning tool for the detection of images embedded with malicious programs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1