KERBEROS (A Moron’s Guide). By Siva Saravanan Jayaraman. KERBEROS – What is Kerberos ??. Network Authentication Protocol It provides for \_strong\_ authentication for client-server applications. Uses secret-key cryptography to provide this strong authentication. .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Siva Saravanan Jayaraman
What is Kerberos ??
Ref – CERT AdvisoryCA 94:01 –Ongoing network monitoring attacks.
Kerberos is based on the Secret-Key Distribution Model that was originally developed by Needham & Schroeder.
-keys are the basis of authentication in Kerberos
-typically a short sequence of bytes.
-used to both encrypt & decrypt
Encryption => plainTxt + Encryption key = cipherTxt
Decryption => cipherTxt + Decryption key = plainTxt
Encryption Key – identical to – Decryption Key (in Conventional Crypto).
Kerb v5 uses Public Key Crypto where Enc Key (!identical ) Dec Key
 R. M. Needham and M. D. Schroeder, ``Using Encryption for Authentication in Large Networks of Computers,'' Communications of the ACM, Vol. 21 (12), pp. 993-99.