Open Access   Article Go Back

Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction

M. Das Nath1 , S. Karforma2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 215-219, Jan-2019

Online published on Jan 20, 2019

Copyright © M. Das Nath, S. Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Das Nath, S. Karforma, “Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.215-219, 2019.

MLA Style Citation: M. Das Nath, S. Karforma "Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction." International Journal of Computer Sciences and Engineering 07.01 (2019): 215-219.

APA Style Citation: M. Das Nath, S. Karforma, (2019). Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction. International Journal of Computer Sciences and Engineering, 07(01), 215-219.

BibTex Style Citation:
@article{Nath_2019,
author = {M. Das Nath, S. Karforma},
title = {Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {215-219},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=621},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=621
TI - Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction
T2 - International Journal of Computer Sciences and Engineering
AU - M. Das Nath, S. Karforma
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 215-219
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

The exponential growth and the success rate of different electronic application areas like E-Services, E-Governance, E-Payment, E-Banking, E-Shopping etc is enormously dependant on security, authenticity and integrity of the most confidential information which is sent across the network by the sender. With the increasing menace of several cyber threats, the sender has to feel safe in sending across their identity details over the communication medium. On the other hand, the receiver must receive the same, without any loss or tampering of information as there are several intruders or eavesdroppers waiting to steal the financial data/information. The security parameters cannot be compromised at any cost. Hence, to combat the pilferage of data, different types of authentication protocols and mechanisms have been in use. For example, the banking sector often uses a two-factor authentication, e-commerce merchants go for different layers of authentication and so on. This paper focuses on the use of the most popular authentication protocol, Kerberos, which could be applied for logging in for e-banking system, in order to achieve the highest level of security. Furthermore, we have tried an attempt to use object-oriented modeling to show the working of the authentication with the help of Kerberos and IDEA encryption algorithm as an added level of protection.

Key-Words / Index Term

Authentication, Object-oriented modeling, Kerberos protocol, IDEA, E-Banking

References

[1] B. Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C”, Wiley Computer Publishing, John Wiley & Sons,Inc.,pp. 266-271,470-475,2007.
[2]W. Stallings, “Cryptography and Network Security”, Pearson,5th Edition, 2011.
[3] J.T. Kohl,. "The use of encryption in Kerberos for network authentication." In Conference on the Theory and Application of Cryptology, pp. 35-43. Springer, New York, NY, 1989.
[4] A.Fox, and S D. Gribble. "Security on the move: indirect authentication using Kerberos." In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, Berkeley, USA, ACM pp.155-164, 1996.
[5] E.El-Emam,M. Koutb, H.M. Kelash, and O.S. Faragallah. "An Authentication Protocol Based on Kerberos 5." IJ Network Security ,Vol.12,No. 3,pp.159-170, 2011.
[6] G. Dua, N. Gautam, D. Sharma, and A. Arora. "Replay attack prevention in Kerberos authentication protocol using triple password", International Journal of Computer Networks & Communications (IJCNC) , Vol.5, No.2, March 2013.
[7] E.El-Emam, M.Koutb, H.Kelash, and O. Farag Allah. "An optimized Kerberos authentication protocol", International Conference on Computer Engineering & Systems 2009, ICCES 2009,Cairo, Egypt, pp. 508-513,IEEE, 2009.
[8] J.T Kohl, B. Clifford Neuman and Y. Theodore. "The evolution of the Kerberos authentication service", 1994.
[9] S.Patil & V. Bhusari,” An enhancement in international data encryption algorithm for increasing security”, Intl. J. of Application or Innovation in Engineering & Management, Vol.3.No.8, pp. 64- 70,2014.
[10]S. F. Shazmeen,S. Prasad,”A Practical Approach for Secure Internet Banking based on Cryptography”, International Journal of Scientific and Research Publications, Volume 2, Issue 12, December 2012, ISSN 2250-3153.
[11]S. Artheeswari, Dr. RM. Chandrasekaran, “INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) FOR DATA SECURITY IN CLOUD”, “International Journal of Technology and Engineering System” (IJTES),Vol 8. No.1, Pp. 06- 11,Jan- Mar 2016, ISSN: 0976-1345.
[12] P.Bhadauriya, F. Suthar & S. Chaudhary, “A Novel Technique for Secure Communication in Cryptography”. IJARCCE, pp.328-331, 2017.
[13] S. Basu, “INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) – A TYPICAL ILLUSTRATION”, International Journal Of Global Research in Computer Science, July 2011.
[14] J. R. Rumbaugh , M. R. Blaha, W. Premerlani, F. Eddy,W. Lorensen,“Object-Oriented Modeling And Design”, Prentice Hall of India Private Limited, India,pp.16-17,1998.
[15] R. Mall, “Fundamentals Of Software Engineering” Fourth Edition, Prentice Hall of India Private Limited, India pp.276-334, 2014.