-- Solution for Practice Final
Originally Posted By: andy
Andy Quach
Kurt Anderson
6.Explain how Alice and Bob can obtain a session for communication using Kerberos.
Alice enters her password to her computer. Her computer will derive K_a where K_a = h(Alice’s password), and then uses K_a to get TGT for Alice from KDC. Alice’s computer presents its TGT to the KDC, along with an authenticator. The authenticator is an encrypted timestamp that serves to avoid a replay. After the KDC verifies Alice’s authenticator, it responds with a “ticket to Bob”. Alice’s computer then uses this ticket to Bob to securely communicate directly with Bob’s computer.
REQUEST = (TGT, Authenticator)
Authenticator = E(timestamep, S_A)
TGT=E(Alice,S_A,K_KDC)
REPLY = E(“Bob”, K_ab, ticket to Bob, S_A)
Ticket to Bob = E (Alice, K_ab, K_b)
'''Originally Posted By: andy'''
Andy Quach<br>Kurt Anderson<br><br>6.Explain how Alice and Bob can obtain a session for communication using Kerberos.<br><br><br><br>Alice enters her password to her computer. Her computer will derive K_a where K_a = h(Alice’s password), and then uses K_a to get TGT for Alice from KDC. Alice’s computer presents its TGT to the KDC, along with an authenticator. The authenticator is an encrypted timestamp that serves to avoid a replay. After the KDC verifies Alice’s authenticator, it responds with a “ticket to Bob”. Alice’s computer then uses this ticket to Bob to securely communicate directly with Bob’s computer.<br><br>REQUEST = (TGT, Authenticator)<br>Authenticator = E(timestamep, S_A)<br>TGT=E(Alice,S_A,K_KDC)<br>REPLY = E(“Bob”, K_ab, ticket to Bob, S_A)<br>Ticket to Bob = E (Alice, K_ab, K_b)