G. Ganapathy's scientific contributions

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (1)


Figure 1 of 1
A modified approach for kerberos authentication protocol with secret image by using visual cryptography
  • Article
  • Full-text available

January 2017

·

186 Reads

·

8 Citations

International Journal of Applied Engineering Research

·

G. Ganapathy

Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modification in Kerberos will be modified to yield better security solutions and to provide centralized access control policy for each user with different parameters like authentication, speed of encryption and decryption and efficiency of transactions. This modified approach enhances the secure authentication of users with non-reputation feature by incorporating public key cryptography and hiding the message of differential access control for each user by using secret image. This differential access control policy is being enforced directly to the clients while doing the authentication of users through Kerberos protocol. The GnuPG has the capability to generate the key pair (ie, private key and public key) in the client itself. So this proposed system used this key pair for encryption and decryption of messages and takes the advantage of non transferring or non importing the private key from any devices or any nodes.

Download
Share

Citations (1)


... However, the forbidden subset cannot reveal the secret image even if k or more shares are stacked together. In halftone visual cryptography [32], a secret binary pixel called a halftone cell is encoded into an array of sub-pixels. Halftone share can be obtained by using halftone cells of an appropriate size. ...

Reference:

A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
A modified approach for kerberos authentication protocol with secret image by using visual cryptography

International Journal of Applied Engineering Research