![]() Kerberos version 4 was primarily designed by Steve Miller and Clifford Neuman. Several versions of the protocol exist versions 1–3 occurred only internally at MIT. The protocol is based on the earlier Needham–Schroeder symmetric-key protocol. Massachusetts Institute of Technology (MIT) developed Kerberos in 1988 to protect network services provided by Project Athena. 4.1.1 User Client-based Login without Kerberos.The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos protocol messages are protected against eavesdropping and replay attacks. Its designers aimed it primarily at a client–server model, and it provides mutual authentication-both the user and the server verify each other's identity. Kerberos ( / ˈ k ɜːr b ər ɒ s/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
0 Comments
Leave a Reply. |