Survey of The Kerberos Research Paper

User Generated

avpx239

Computer Science

Description

Please do the two tasks, develop the research paper and PPT

Task 1: Research Paper

  • The purpose of the research paper is to provide a survey of the Kerberos authentication protocol.
  • Items that should be addressed include, but are not limited to:
    • Strengths of this authentication protocol.
    • Weaknesses of this authentication protocol.
    • Description of algorithm to implement Kerberos.
    • Relevant examples of modern applications that utilize Kerberos.

Paper Requirements:

  • Length
    • Minimum 10 pages / Maximum 20 pages
    • The title page and references pages do not count towards the page length requirements.
    • Double spaced
    • Times New Roman Font
  • APA style (https://owl.english.purdue.edu/owl/resource/560/01/) (Very Important)
  • At least 5 works cited
  • At least 2 of your references have to be scholarly peer-reviewed articles
  • Research paper will be checked for plagiarism so be sure to correctly cite your sources!

Task 2: PPT Presentation

  • Goal is to summarize your research paper
  • PowerPoint Presentation is required
  • 12 slides excluding the opening and Reference/citation page


Unformatted Attachment Preview

Residency Assignment for ISOL535 Research Paper • The purpose of the research paper is to provide a survey of the Kerberos authentication protocol. • Items that should be addressed include, but are not limited to: o Strengths of this authentication protocol. o Weaknesses of this authentication protocol. o Description of algorithm to implement Kerberos. o Relevant examples of modern applications that utilize Kerberos. Paper Requirements: • Length o Minimum 10 pages / Maximum 20 pages o The title page and references pages do not count towards the page length requirements. o Double spaced o Times New Roman Font • APA style (https://owl.english.purdue.edu/owl/resource/560/01/) • At least 5 works cited • At least 2 of your references have to be scholarly peer-reviewed articles • Research paper will be checked for plagiarism so be sure to correctly cite your sources! Research Presentation • Goal is to summarize your research paper • PowerPoint Presentation is required and must be submitted inside of iLearn • Must present for at least 10 minutes but no more than 15 minutes • All group members need to participate in the presentation
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

KERBEROS
AUTHENTICATION
PROGRAM

Name
Institution Affiliation
Date

INTRODUCTION
• Kerberos is a computer authentication protocol that utilizes the use of
tickets
• The name is drawn from Greek mythology
• It was developed in Massachusetts
• For some period, the export of the product was banned in America

CONT.;
• The protocol involves a number of processes
• It basically begins with the request for a ticket
• This is followed by verification of credentials
• A session key is then generated
• The final step involves the storage of the ticket and its renewal on
expiry

STRENGTHS OF THE AUTHENTICATION
PROTOCOL
• One strength is that passwords aren’t sent over networks
• There also exists a mutual authentication of client and server
• This is achieved through the verification in each step

CONT.;
• It includes time stamps as a security measure
• This is in order to deal with brute force attacks
• The protocol also undergoes public scrutiny

CONT,;
• It provides authentication across networks.
• Allows for interaction even over insecure networks.
• This is achieved through measures such as “replay cache”.

WEAKNESSES OF KERBEROS
• The protocol is prone to a variety of cyber attacks.
• All these pry on the weaknesses of the protocol.
• It includes strict time requirements.
• The clocks of the two ends need to be synchronized.

CXONT.;
• Different network requirements require different Kerberos keys.
• This complicates virtual hosting and clustering.
• The system also utilizes a central server.
• This disadvantages individuals incase of downtime.

DESCRIPTION OF ALGORITHM
• It basically revolves around the security of information.
• It utilizes client server architecture to give user authentication.
• Algorithms are used in encryption and decryption.
• They are involved in the key cryptography.

CONT.;
• It utilizes Data Encryption Standard(DES).
• The DES algorithm has a process of 16 steps.
• It begins by the feeding of information by the client.
• The whole process revolves around data processing.

DESCRIPTION OF ALGORITHM
• It basically involves a permutation process.
• On completion of the process, 64 bits are produced.
• The processes depict the use of algorithms in the authentication.
• The computer user experiences none of this.
• In general, the lengthy process is summarized in Kerberos protocol.

EXAMPLES OF MODERN
APPLICATIONS
• It is commonly used by software corporations.
• It basically used for system authentication.
• It is also used for the secure access of network resources.
• It has been in use in all versions of Windows since 2000.
• It is also used in a variety of operating systems.

CONCLUSION
• In general, it is one of the most popular security systems.
• Its popularity clearly shows the achievement of its purpose.
• It existence has been a great improvement to the previous host to
host authentication.
• However, there is a need to address the security challenges it faces
accordingly.

REFERENCES
• Arnold, T. W., Dames, E. A., & Marik, M. D. (2016). U.S. Patent No. 9,369,274. Washington, DC: U.S. Patent and Trademark
Office.
• Bazaz, T., & Khalique, A. (2016). A Review on Single Sign on Enabling Technologies and Protocols. International Journal of
Computer Applications, 151(11), 18-25.
• Grobman, S. L. (2017). U.S. Patent No. 9,602,275. Washington, DC: U.S. Patent and Trademark Office.
• Kirsal-Ever, Y., Kirsal, Y., Polzonetti, A., Mostarda, L., Sule, C., Shah, P., & Ever, E. (2013, January). Challenges of Kerberos
Variance with High QoS Expectations. In Proceedings of the International Conference on Security and Management
(SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp).
• Kerberos: Strengths and Weaknesses http://people.duke.edu/~rob/kerberos/kerbasnds.html
• Sutradhar, M. R., Sultana, N., Dey, H., & Arif, H. (2018, June). A New Version of Kerberos Authentication Protocol Using ECC
and Threshold Cryptography for Cloud Security. In 2018 Joint 7th International Conference on Informatics, Electronics &
Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR) (pp. 239-244).
IEEE.
• Zhu, Y., Ma, L., & Zhang, J. (2015). An enhanced Kerberos protocol with non‐interactive zero‐knowledge proof. Security
and Communication Networks, 8(6), 1108-1117.

Attached.

Running head: KERBEROS AUTHENTICATION PROTOCOL

Kerberos Authentication Protocol
Student’s Name
Institutional Affiliation
Date

1

KERBEROS AUTHENTICATION PROTOCOL

2

Introduction
Kerberos is a computer authentication protocol that utilizes tickets in order to allow
nodes communicating over a non-secure network in order to prove their identity to each other in
a secure way (Grobman, 2017). The name Kerberos hails from Greek mythology. Kerberos or
Cerberus was a three-headed dog that guarded Hades. The design of Kerberos aimed it as a
client-server model. The protocol provides mu...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags