0
2.2kviews
IT Cryptography & Network Security Module 6.1
1 Answer
| written 7.1 years ago by |
Network Security Applications
Kerberos
Many real-life systems use an authentication protocol called Kerberos the Needham - Shroeder is the basis of Kerberos.
Version 4 of Kerberos is found in most practical implementation also version 5 is in use.
Working of Kerberos
There are four parties involved in Kerberos protocol. 1. …