2009 Sixth International Conference on Information Technology: New Generations 2009
DOI: 10.1109/itng.2009.304
|View full text |Cite
|
Sign up to set email alerts
|

Implementation Comparison of  Kerberos Passwords by RC-5 Encryption Type Analysis with  RC-4 Encryption

Abstract: In this paper, we will discuss how we can get Kerberos passwords by capturing a single packet, encrypted using the RC5-HMAC encryption type. We will discuss how presently existing two methods [1] that when combined together, can reduce the time needed to crack a password redused over brute force and will propose scheme how that time can reduce more. The first method uses known text in the pre authentication phase to skip the verification section of the decryption process. The second method pre computes some of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
0
0
0
1
Order By: Relevance
“…Metode autentikasi tradisional Needham-Schroeder menjadi dasar dari sistem autentikasi Kerberos [9]. Sistem ini menggunakan pihak ketiga yang terpercaya untuk melakukan autentikasi dan pertukaran kunci antara entitas di jaringan.…”
Section: Kerberos Authentication Protocolunclassified
“…Metode autentikasi tradisional Needham-Schroeder menjadi dasar dari sistem autentikasi Kerberos [9]. Sistem ini menggunakan pihak ketiga yang terpercaya untuk melakukan autentikasi dan pertukaran kunci antara entitas di jaringan.…”
Section: Kerberos Authentication Protocolunclassified