Why is it necessary, in the Kerberos protocol, to include S in the message sent from KS to C (i.e., message M2)? Describe an attack that an intruder can use if S is not included.
What will be an ideal response?
I can intercept the first message (C,S) sent in the clear from C to KS and substitute the message (C,I). Thereafter C will think I is S and send private information to I.
Computer Science & Information Technology
You might also like to view...
Forms are often saved as ________ so they can be used repeatedly for data entry
Fill in the blank(s) with correct word
Computer Science & Information Technology
A nested loop can be used to process all of the elements in a(n) implicit array.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology