Use of Secure Repository for Passwordless Handshake to Enhance the Authentication
Marlapalli Krishna1, Yuva Krishna Aluri2, Vishnu Vardhan Battu3, Rakesh K4, Bandlamudi S B P Rani5

1Dr. Marlapalli Krishna, Professor, Dept. of CSE, Sir C R Reddy College of Engineering, Eluru, India.
2Yuva Krishna Aluri, Assistant Professor, Dept. of CSE, P.V.P Siddhartha Institute of Technology, India.
3Vishnu Vardhan Battu, Assistant Professor, Dept. of CSE, P.V.P Siddhartha Institute of Technology, India.
4Rakesh Kancharla, Assistant Professor, Dept. of CSE, GVPCDPGC, Visakhapatnam, India.
5Bandlamudi S B P Rani, Assistant Professor, Dept. of CSE, Sir C R Reddy College of Engineering, Eluru, India.

Manuscript received on 24 August 2019. | Revised Manuscript received on 02 September 2019. | Manuscript published on 30 September 2019. | PP: 2099-2107 | Volume-8 Issue-11, September 2019. | Retrieval Number: K19750981119/2019©BEIESP | DOI: 10.35940/ijitee.K1975.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper we presented an innovative thought to provide better security for authentication procedure. In this procedure user’s password is restricted to transmit over the network, still provides the same security for authentication services. To accomplish this we have used smart card which adopts the Kerberos Protocol and a secure password repository. As the smart card system allows restricted access, it provides a secure place to keep credentials safe. Without revealing the secrets to public an authentication system may perform its scope by referencing to them through identifiers. This promotes the credibility of the mechanism while at the same time it achieves to reduce the overhead of the authentication systems due to the complex encryptions procedures.
Keywords: Smart Card, Password, Protocol, Authentication, Kerberos v5, LDAP
Scope of the Article: