Why is it necessary, in the Kerberos protocol, to include S in the message sent from KS to C (i.e., message M2)? Describe an attack that an intruder can use if S is not included.

What will be an ideal response?

I can intercept the first message (C,S) sent in the clear from C to KS and substitute the message (C,I). Thereafter C will think I is S and send private information to I.

Computer Science & Information Technology

You might also like to view...

Forms are often saved as ________ so they can be used repeatedly for data entry

Fill in the blank(s) with correct word

Computer Science & Information Technology

A nested loop can be used to process all of the elements in a(n) implicit array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology