An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication Article Swipe
The security protocol of network system can ensure the reliability of network communication. Kerberos protocol is a kind of security verification mechanism based on shared key, which has been adopted for a long time on the Internet. This text introduces the authentication process of Kerberos v5 protocol. To the defect that the authentication server don’t authenticate the user’s identity but it hold safe in building on the basis whether the user can correctly decrypt the ciphertext message in the protocol, we put forward a scheme that adding in the Challenge/Response mechanism to improve its security in Symmetric Cipher Mechanism. Passing the improved scheme’s analysis we can perceive the method that adding in Challenge/Response identity authentication technology will greatly resist Offline Password Conjecture Attack.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.52783/jes.1642
- https://journal.esrgroups.org/jes/article/download/1642/1296
- OA Status
- hybrid
- References
- 13
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4394578724
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4394578724Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.52783/jes.1642Digital Object Identifier
- Title
-
An Analysis and Improvement Scheme for the Weakness of Kerberos V5 AuthenticationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-04-08Full publication date if available
- Authors
-
Tao GongList of authors in order
- Landing page
-
https://doi.org/10.52783/jes.1642Publisher landing page
- PDF URL
-
https://journal.esrgroups.org/jes/article/download/1642/1296Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://journal.esrgroups.org/jes/article/download/1642/1296Direct OA link when available
- Concepts
-
Kerberos, Authentication (law), Scheme (mathematics), Computer science, Computer security, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
13Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4394578724 |
|---|---|
| doi | https://doi.org/10.52783/jes.1642 |
| ids.doi | https://doi.org/10.52783/jes.1642 |
| ids.openalex | https://openalex.org/W4394578724 |
| fwci | 0.0 |
| type | article |
| title | An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication |
| biblio.issue | 2 |
| biblio.volume | 20 |
| biblio.last_page | 1960 |
| biblio.first_page | 1955 |
| topics[0].id | https://openalex.org/T11504 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9377999901771545 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Advanced Authentication Protocols Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C32455479 |
| concepts[0].level | 3 |
| concepts[0].score | 0.953148365020752 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q506053 |
| concepts[0].display_name | Kerberos |
| concepts[1].id | https://openalex.org/C148417208 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5739666819572449 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[1].display_name | Authentication (law) |
| concepts[2].id | https://openalex.org/C77618280 |
| concepts[2].level | 2 |
| concepts[2].score | 0.572138786315918 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[2].display_name | Scheme (mathematics) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.5366818904876709 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.30101481080055237 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C33923547 |
| concepts[5].level | 0 |
| concepts[5].score | 0.12617382407188416 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[5].display_name | Mathematics |
| concepts[6].id | https://openalex.org/C134306372 |
| concepts[6].level | 1 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[6].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/kerberos |
| keywords[0].score | 0.953148365020752 |
| keywords[0].display_name | Kerberos |
| keywords[1].id | https://openalex.org/keywords/authentication |
| keywords[1].score | 0.5739666819572449 |
| keywords[1].display_name | Authentication (law) |
| keywords[2].id | https://openalex.org/keywords/scheme |
| keywords[2].score | 0.572138786315918 |
| keywords[2].display_name | Scheme (mathematics) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.5366818904876709 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.30101481080055237 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/mathematics |
| keywords[5].score | 0.12617382407188416 |
| keywords[5].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.52783/jes.1642 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5406946370 |
| locations[0].source.issn | 1112-5209 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1112-5209 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Electrical Systems |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nd |
| locations[0].pdf_url | https://journal.esrgroups.org/jes/article/download/1642/1296 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Electrical Systems |
| locations[0].landing_page_url | https://doi.org/10.52783/jes.1642 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5088814076 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0248-9404 |
| authorships[0].author.display_name | Tao Gong |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Juanjuan Gong, Tao Men, Sha Feng, Dongming Yu |
| authorships[0].is_corresponding | True |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://journal.esrgroups.org/jes/article/download/1642/1296 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11504 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9377999901771545 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Advanced Authentication Protocols Security |
| related_works | https://openalex.org/W4224251339, https://openalex.org/W2360607528, https://openalex.org/W2383871034, https://openalex.org/W2887725106, https://openalex.org/W2533399023, https://openalex.org/W4388241519, https://openalex.org/W4386108990, https://openalex.org/W1612824710, https://openalex.org/W2393525829, https://openalex.org/W2242172122 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.52783/jes.1642 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5406946370 |
| best_oa_location.source.issn | 1112-5209 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1112-5209 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Electrical Systems |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nd |
| best_oa_location.pdf_url | https://journal.esrgroups.org/jes/article/download/1642/1296 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Electrical Systems |
| best_oa_location.landing_page_url | https://doi.org/10.52783/jes.1642 |
| primary_location.id | doi:10.52783/jes.1642 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5406946370 |
| primary_location.source.issn | 1112-5209 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1112-5209 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Electrical Systems |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nd |
| primary_location.pdf_url | https://journal.esrgroups.org/jes/article/download/1642/1296 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Electrical Systems |
| primary_location.landing_page_url | https://doi.org/10.52783/jes.1642 |
| publication_date | 2024-04-08 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2365793943, https://openalex.org/W2107450407, https://openalex.org/W4376625389, https://openalex.org/W2132303913, https://openalex.org/W4210851634, https://openalex.org/W2146749986, https://openalex.org/W3188584287, https://openalex.org/W3087283762, https://openalex.org/W4321506129, https://openalex.org/W4292737490, https://openalex.org/W4225996865, https://openalex.org/W11971752, https://openalex.org/W4299402001 |
| referenced_works_count | 13 |
| abstract_inverted_index.a | 16, 31, 83 |
| abstract_inverted_index.To | 47 |
| abstract_inverted_index.in | 63, 77, 87, 95, 111 |
| abstract_inverted_index.is | 15 |
| abstract_inverted_index.it | 60 |
| abstract_inverted_index.of | 3, 10, 18, 43 |
| abstract_inverted_index.on | 23, 34, 65 |
| abstract_inverted_index.to | 91 |
| abstract_inverted_index.v5 | 45 |
| abstract_inverted_index.we | 80, 104 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.but | 59 |
| abstract_inverted_index.can | 6, 71, 105 |
| abstract_inverted_index.for | 30 |
| abstract_inverted_index.has | 27 |
| abstract_inverted_index.its | 93 |
| abstract_inverted_index.put | 81 |
| abstract_inverted_index.the | 8, 35, 40, 48, 51, 56, 66, 69, 74, 78, 88, 100, 107 |
| abstract_inverted_index.This | 37 |
| abstract_inverted_index.been | 28 |
| abstract_inverted_index.hold | 61 |
| abstract_inverted_index.key, | 25 |
| abstract_inverted_index.kind | 17 |
| abstract_inverted_index.long | 32 |
| abstract_inverted_index.safe | 62 |
| abstract_inverted_index.text | 38 |
| abstract_inverted_index.that | 50, 85, 109 |
| abstract_inverted_index.time | 33 |
| abstract_inverted_index.user | 70 |
| abstract_inverted_index.will | 116 |
| abstract_inverted_index.based | 22 |
| abstract_inverted_index.basis | 67 |
| abstract_inverted_index.which | 26 |
| abstract_inverted_index.Cipher | 97 |
| abstract_inverted_index.adding | 86, 110 |
| abstract_inverted_index.defect | 49 |
| abstract_inverted_index.ensure | 7 |
| abstract_inverted_index.method | 108 |
| abstract_inverted_index.resist | 118 |
| abstract_inverted_index.scheme | 84 |
| abstract_inverted_index.server | 53 |
| abstract_inverted_index.shared | 24 |
| abstract_inverted_index.system | 5 |
| abstract_inverted_index.Attack. | 122 |
| abstract_inverted_index.Offline | 119 |
| abstract_inverted_index.Passing | 99 |
| abstract_inverted_index.adopted | 29 |
| abstract_inverted_index.decrypt | 73 |
| abstract_inverted_index.don’t | 54 |
| abstract_inverted_index.forward | 82 |
| abstract_inverted_index.greatly | 117 |
| abstract_inverted_index.improve | 92 |
| abstract_inverted_index.message | 76 |
| abstract_inverted_index.network | 4, 11 |
| abstract_inverted_index.process | 42 |
| abstract_inverted_index.whether | 68 |
| abstract_inverted_index.Kerberos | 13, 44 |
| abstract_inverted_index.Password | 120 |
| abstract_inverted_index.analysis | 103 |
| abstract_inverted_index.building | 64 |
| abstract_inverted_index.identity | 58, 113 |
| abstract_inverted_index.improved | 101 |
| abstract_inverted_index.perceive | 106 |
| abstract_inverted_index.protocol | 2, 14 |
| abstract_inverted_index.security | 1, 19, 94 |
| abstract_inverted_index.user’s | 57 |
| abstract_inverted_index.Internet. | 36 |
| abstract_inverted_index.Symmetric | 96 |
| abstract_inverted_index.correctly | 72 |
| abstract_inverted_index.mechanism | 21, 90 |
| abstract_inverted_index.protocol, | 79 |
| abstract_inverted_index.protocol. | 46 |
| abstract_inverted_index.Conjecture | 121 |
| abstract_inverted_index.Mechanism. | 98 |
| abstract_inverted_index.ciphertext | 75 |
| abstract_inverted_index.introduces | 39 |
| abstract_inverted_index.scheme’s | 102 |
| abstract_inverted_index.technology | 115 |
| abstract_inverted_index.reliability | 9 |
| abstract_inverted_index.authenticate | 55 |
| abstract_inverted_index.verification | 20 |
| abstract_inverted_index.authentication | 41, 52, 114 |
| abstract_inverted_index.communication. | 12 |
| abstract_inverted_index.Challenge/Response | 89, 112 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5088814076 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.04903344 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |