International Journal of Advances in Science, Engineering and Technology(IJASEAT)
.
Follow Us On :
current issues
Volume-9,Issue-2  ( Apr, 2021 )
Statistics report
Sep
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
  Journal Paper


Paper Title :
A Comparative Study Of Elliptic Curve Cryptography And Rsa To Kerberos Authentication Protocol

Author :M. Muni babu, S. Mp. Qubeb, V. Sunil babu

Article Citation :M. Muni babu ,S. Mp. Qubeb ,V. Sunil babu , (2014 ) " A Comparative Study Of Elliptic Curve Cryptography And Rsa To Kerberos Authentication Protocol " , International Journal of Advances in Science, Engineering and Technology(IJASEAT) , pp. 43-45, Volume-1,Issue-3

Abstract : The main objective to develop Kerberos is initiated by the Massachusetts Institute of Technology’s (MIT) for the purpose of developing the project called Athena which was launched in 1983 with the main goal of integrating computers into the curriculum at MIT. The need for networked security arose as MIT migrated from terminal-based computer access to workstation-based access via Ethernet. Kerberos was designed to secure clients and servers connecting via an untrusted network, and it is currently used in a variety of applications. In Kerberos V protocol RSA has been used for encryption session keys and / or to sign messages, RSA takes long key size it is one of the drawback of the Kerberos protocol. The main aim of this paper is to provide the high level comparison of Elliptic Curve Cryptography over RSA cryptography to overcome the large key size drawback of Kerberos V protocol. However, here, we are not provide any mathematical details of either cryptosystem, nor will we offer details of the calculations performed when making our comparison but we provide the comparison between Elliptic Curve Cryptography (ECC) and RSA Cryptography . We analyzed that the ECC has been used small key size for encryption session key and /or to sign messages, Although Elliptic Curve Cryptography requires more mathematical calculations that are computationally expensive, it is well believed that they caneliminate some of the traditional Kerberos protocol limitations such as key size. ECC provides greater security and more efficient performance than the RSA Cryptography .

Type : Research paper

Published : Volume-1,Issue-3


DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-331   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 37
| Published on 2014-01-22
   
   
IRAJ Other Journals
IJASEAT updates
Volume-9,Issue-2(April, 2020)
The Conference World

JOURNAL SUPPORTED BY