Using Counter Variable of Sent Message in the Tree Structure to Tackle the Disrupting Attack to Timestamp at Kerberos Cryptographic Network

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,042

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CESD01_020

تاریخ نمایه سازی: 25 اسفند 1392

Abstract:

Authentication is a mechanism by which any entity can check whether its partner is one who claims to be in a relationship or is a disrupting that has been replaced by real party. One of the authentication protocols is Kerberos where timestamp is used to avoid sending repeated and unfeigned messages by Trudy. In this article a counter variable is considered for each client that represents number of sent messages from the client to servers. Advantage of this variable that host at ticket granting server is aware of repeated message during send it. Also, at servers we used a binary tree structure to store the messages and searching between them. Simulation results show significant improvement in the face of replay attacks by Trudy and response time to service at Kerberos Cryptographic Network.

Authors

Ali Akbar Tajari Siahmarzkooh

PhD student in Computer Sciences at University of Tabriz

Jaber Karimpour

Assistant Professor, Department of Computer Sciences at University of Tabriz

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Stallings. William, Cryptography and network security: Principles and Practice, fifth ...
  • Mendez. A and Pereniguez. F and Lopez.G and Millan.G, Ou ...
  • Sood. K and Sarje. A and Singh. K, A Secure ...
  • Aslan. H, Logical analysis of A UTHMA C_DH: a _ ...
  • Lopez.R and Pereniguez. F and Lopez. G and Mende, A, ...
  • Pereniguez. F and Lopez. R and Kambourakis G and Gritzalis. ...
  • Fayed. _ and Daydamoni. E and Atwan. A, Efficient combined ...
  • Butler. F and Cervesato. I and Jaggard. A and Scedrov. ...
  • Lifan, Design of a ticket-based single sign-on protocol, Journal of ...
  • Huang. Y and Lu. P and Tygar. J and Joseph. ...
  • Shrestha. A and Choi. D and Kwon. G and Han. ...
  • Lopez. J and Oppliger. R and Permul G, Authentication and ...
  • Liu. H and Luo. P and Wang. D, A distributed ...
  • Cervestao. I and Jaggard. A and Scedrov. A and Tsay. ...
  • Sun. H and Yeh. H, Password- based authentication and key ...
  • Moralis. A and Pouli. V and Papavassiliou. S and Maglaris. ...
  • Hwang. R and Su.F, A new efficient authentication protocol for ...
  • Chien. H and Jan. J, A hybrid authentication protocol for ...
  • نمایش کامل مراجع