CFP last date
20 May 2024
Reseach Article

Implementation of highly efficient Authentication and Transaction Security

by Garima Verma, R.P. Arora
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 3
Year of Publication: 2011
Authors: Garima Verma, R.P. Arora
10.5120/2489-3358

Garima Verma, R.P. Arora . Implementation of highly efficient Authentication and Transaction Security. International Journal of Computer Applications. 21, 3 ( May 2011), 43-49. DOI=10.5120/2489-3358

@article{ 10.5120/2489-3358,
author = { Garima Verma, R.P. Arora },
title = { Implementation of highly efficient Authentication and Transaction Security },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 3 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number3/2489-3358/ },
doi = { 10.5120/2489-3358 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:04.635683+05:30
%A Garima Verma
%A R.P. Arora
%T Implementation of highly efficient Authentication and Transaction Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 3
%P 43-49
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. Our research was aimed at enhancing the security of transactions over a network. In this paper, we used Kerberos Encryption Technique for authentication and transaction security in the network. Further, we created an Authentication Server that used to derive a 64 bit key from user’s password. This password was of arbitrary length. The generated key then was used by authentication server, to encrypt ticket granting ticket + session key. The key generated by authentication server was then used by the client at the time of transaction through the transaction server to validate an authentic transaction. However, there was an issue of cross-validation of the ticket by the transaction server for which we included a database and encryption of all the text sent by any client to the transaction server.

References
  1. Prof R.P. Arora, Garima Verma, “Implementation of Authentication and Transaction Security based on Kerberos”, IJITCE, Feb 2011 7.
  2. Dr. S. Santhosh Baboo, K. Gokulraj, “A Secure Dynamic Authentication Scheme for Smart Card based Networks”, International Journal of Computer Applications, Number 8- Article 2, pp. 1605-2157, 2010
  3. K. Aruna et. al (2010), “A new collaborative trust enhanced security model for distributed systems”. International Journal of Computer Application, No-26
  4. Steve Mallard(2010), “Methods of authentication”, Bright Hub
  5. Hongjun liu et. al(2008), “A distributed expansible authentication model based on Kerberos” Journal of Network and Computer Application, Vol.31, Issue 4
  6. Dr.Mohammad N. Abdullah & May T. Abdul-Hadi, “A Secure Mobile Banking Using Kerberos Protocol”, Engg & Technology Journal, Vol 27, No 6, 2009.
  7. “How Kerberos Authentication Works”, Network on line magazine, Jan 2008
  8. “How Kerberos Authentication Works“,Learn Networking on line magazine, Jan’2008
  9. Frederick Butler,, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov and Christopher Walstad, “Formal Analysis of Kerberos 5”, Sep 2006
  10. Rong Chen, Yadong Gui and Ji Gao, “Modification on Kerberos Authentication Protocol in Grid Computing Environment”, vol 3032, 2004.
  11. I. Cervesato,A. D. Jaggard,A. Scedrov,C. Walstad, “Specifying Kerberos 5 cross-realm authentication”,vol 3032, 2004.
  12. “Security of Network Identity: Kerberos or PKI”, System News (2002), Vol.56, Issue-II
  13. Ian Downnard, “Public-key cryptography extensions into Kerberos”. IEEE Potentials 2002.
  14. B. Clifford Neuman and Theodore Ts'o, Kerberos: An Authentication Service for Computer Networks, IEEE Communications 32 (1994), no. 9, 33--38.
  15. MIT Kerberos Website, “ http://web.mit.edu/kerberos/www”.
  16. William Stallings, “Cryptography and Network Security”, Third Edition.
  17. Ravi Ganesan, “Yaksha’ : Augmenting Kerberos with Public Key cryptography”.
  18. John E. Canavan, “Fundamentals of Network Security”.
  19. Chris Brenton with Cameron hunt , “ ACTIVE DEFENCE A comprehensive guide to network security”
Index Terms

Computer Science
Information Sciences

Keywords

secret key Local Directional Pattern cryptography authentication ticket session key