Main Article Content
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax return. Network security has become a massive problem. All this requires network to identify its legal users for providing services. An authentication protocol used is Kerberos which uses strong secret key for user authentication but it is vulnerable in case of weak passwords. Authentication & key distribution protocols requires sharing secret key(s) with a view that only the concerned users know to derive the information from it. These protocols are vulnerable to key guessing attacks. Another important consideration is perfect forward secrecy in which our proposed scheme cover cases with application servers, authentication servers or clients key are revealed & their combination. In this paper our proposed scheme deal with key guessing attacks, perfect forward secrecy and protocols for few combinations of keys. All these protocols are based on the fact that the keys are weak & can be exploited easily.
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
1] S. Lucks, Open key exchange: How to defeat dictionary attacks without encrypting public keys, in: Proc. of the Security Protocol Workshop,Springer-Verlag, April 1997.
 T. Wu, The secure remote password protocol, in: Internet Society Symposium on Network and Distributed System Security, 1998.
 T. Kwon, J. Song, Efficient key exchange and authentication protocol protecting weak secrets, IEICE Trans. Fundamentals E81-A (1) (January1998) 156–163.
 M. Steiner, G. Tsudik, M. Waidner, Refinement and extension of encrypted key exchange, Oper. Syst. Rev. 29 (3) (July 1995) 22–30.
 Y. Ding, P. Horster, Undetectable on-line password guessing attacks, Technical Report, TR-95-13-F, July 1995.
 J.T. Kohl, B.C. Neuman, T. Ts’o, The evolution of the kerberos authentication system, in: Distributed Open System, IEEE Comput. Soc. Press,1994, pp. 78–94.
 Needham,R.M. and M.D. Schroeder(1978) . “ Using encryption for authentication in large networks of computers” Communications of the ACm, 21, 993-999.