Back to Results
First PageMeta Content
Cyberwarfare / Kerberos / Ticket Granting Ticket / Integrated Windows Authentication / Challenge-response authentication / Ticket / Password / Key management / Single sign-on / Computer network security / Computer security / Computing


Limitations of the Kerberos Authentication System† Steven M. Bellovin – AT&T Bell Laboratories
Add to Reading List

Document Date: 2013-03-11 15:35:02


Open Document

File Size: 224,02 KB

Share Result on Facebook

City

Dallas / /

Company

AT&T / CBC / Needham / /

Country

United States / /

Event

FDA Phase / /

IndustryTerm

time synchronization protocols / mercial cryptographic devices / handheld device / obvious solutions / basic login protocol / keystore protocol / time-based protocols / steel doors / removable media / ticket-granting server / boot device / supports alternative encryption algorithms / dedicated network routers / present solutions / possible solution / cryptographic systems / large internet / stateless protocol / challenge/response protocol / client/server protocol / authenti cation server / authenticated network services / publicly-known algorithm / communication protocols / typical computer systems / computing / typical network / realm routing protocol / encryption algorithm / specialpurpose cryptographic hardware / addr client principal server / time-based protocol / /

OperatingSystem

UNIX / UNIX system / /

Organization

MIT / /

Person

Merritt Table / Clifford Neuman / Michael Merritt / /

Position

guard / forward / judge / /

Product

Pentax K-x Digital Camera / Moor88 / Loma89 / Kohl90 / /

Technology

time synchronization protocols / client/server protocol / same keystore protocol / UNIX / encryption algorithm / stateless protocol / smart card / private key / secret key / Kerberos protocol / operating system / UDP / peer-to-peer system / shared memory / encryption / challenge/response protocol / realm routing protocol / time-based protocols / 5 supports alternative encryption algorithms / WEAKNESSES Replay Attacks The Kerberos protocol / Kerberos protocols / publicly-known algorithm / alternative communication protocols / UNIX system / encryption system / caching / dedicated network routers / simply one extra encryption / basic login protocol / time-based protocol / 5 protocol / /

SocialTag