IDEAS home Printed from https://ideas.repec.org/a/aac/ijirss/v8y2025i3p3646-3662id7328.html
   My bibliography  Save this article

KTCGM: Towards A novel solution for enhancing Kerberos-5 with threshold cryptography and ML-based anomaly detection

Author

Listed:
  • Rami Almatarneh
  • Mohammad Aljaidi
  • Ayoub Alsarhan
  • Sami Aziz Alshammari
  • Nayef H. Alshammari

Abstract

Since its introduction at MIT in 1993, the Kerberos 5 protocol has been a fundamental pillar of network authentication, using symmetric key cryptography and a centralized Key Distribution Center (KDC) to secure distributed computing environments. While it improved on its predecessors by offering stronger encryption and cross-domain functionality, it no longer fully meets the demands of modern systems due to its major drawbacks: the risk of a single point of failure in the KDC, vulnerability to password-based attacks, and a strict reliance on synchronized clocks for replay protection. To address these limitations, we recommend some significant modifications. Instead of a centralized KDC, we employ a network of nodes with the shared master key using threshold cryptography in such a way that even when part of the nodes are compromised, the system remains unaffected. To eliminate the need for synchronized clocks, we replace timestamp-based authentication with nonce-based authentication and a short-term cache for replay protection. To provide extra security against password attacks, we add machine learning-based anomaly detection, which monitors authentication patterns in real-time at all times. In case of suspicious activity, the system adaptively triggers adaptive multi-factor authentication (MFA). This context-aware adaptive MFA will wisely switch security features by location or device context, trying to strike a balance between security and convenience. Additionally, we optimize nonce management with efficient caching techniques to minimize storage overhead and enhance scalability by distributing the authentication load across multiple nodes. While these extensions significantly enhance Kerberos 5's resistance and adaptability to today's distributed systems, they come with trade-offs. A distributed KDC introduces some overhead and will have a minor impact on performance, while nonce handling, anomaly detection, and MFA consume additional computational resources. Our analysis shows, however, that these costs are counteracted by higher availability, increased resistance to attack, and increased flexibility within the authentication process. Future developments will focus on optimizing and scaling it. In rectifying Kerberos 5's inherent weaknesses, this work makes it ready for modernization in the context of large networks, allowing it to become a more stable and forward-thinking method of authentication.

Suggested Citation

  • Rami Almatarneh & Mohammad Aljaidi & Ayoub Alsarhan & Sami Aziz Alshammari & Nayef H. Alshammari, 2025. "KTCGM: Towards A novel solution for enhancing Kerberos-5 with threshold cryptography and ML-based anomaly detection," International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 8(3), pages 3646-3662.
  • Handle: RePEc:aac:ijirss:v:8:y:2025:i:3:p:3646-3662:id:7328
    as

    Download full text from publisher

    File URL: https://ijirss.com/index.php/ijirss/article/view/7328/1546
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:3:p:3646-3662:id:7328. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.