Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. To prevent attacks, the authenticator must be encrypted in Step (3). However,

ID: 3531683 • Letter: 1

Question

1. To prevent attacks, the authenticator must be encrypted in Step (3). However, the client does NOT know the long term key of the TGS. How can Kerberos let the TGS know the authenticator encryption key? Please give a complete answer.


2. After a while, the client will receive the ticket. Then the client will send the ticket to the server. However, this ticket itself is NOT sufficient for the server to offer the service to the client because Mallory may launch a serious attack. What can this work do to fool the server?


3. When the Server receives the authenticator and the ticket from the client. The server will compare the information items contained in the authenticator and the ticket to authenticate the client user

Explanation / Answer

please visit this site for step wise query and please rate me first

http://www.cmf.nrl.navy.mil/krb/kerberos-faq.html