0
2.2kviews
IT Cryptography & Network Security Module 6.1
1 Answer
0
6views

Network Security Applications

Kerberos

Many real-life systems use an authentication protocol called Kerberos the Needham - Shroeder is the basis of Kerberos.

Version 4 of Kerberos is found in most practical implementation also version 5 is in use.

Working of Kerberos

There are four parties involved in Kerberos protocol. 1. …

Create a free account to keep reading this post.

and 4 others joined a min ago.

Please log in to add an answer.