Lesson 6

Network Security Applications


  • All Topics
  • Kerberos

    1 Authentication Application: Kerberos


    Many real-life systems use an authentication protocol called Kerberos the Needham - Shroeder is the basis of Kerberos.

    Version 4 of Kerberos is found in most practical implementation also version 5 is in use.

    Working of Kerberos

    There are four ...

    Read Full →
    2 Key Distribution Center (KDC)

    Key Distribution Center (KDC) is a central authority dealing with keys for individual computers (nodes) in a computer network. It is similar to the concept of the Authentication Server (AS) and Ticket Granting Server (TGS) in Kerberos.

    The basic idea ...

    Read Full →