Why are timestamps used in the kerberos protocol
It let to use in transactions different types of encryption. Due to this the compatibility wih a previojs version was realized. Moreover a KDC now can choose the most safe encryption protocol supported by every party. The original Kerberos 4 was vulnerable facing brute-force. The impostance of such problem is sharpened by user's habitude to create easy passwords. To complicate a carrying out of this kind of attack there was a preliminary authentication added in Kerberos 5.
On this step a KDS requires that a user has confirm his identity before he gets a ticket. Jump to: navigation , search. Navigation menu Personal tools Log in. Attachments: Assignment. Sangeeta answered 5 years ago answers so far.
Solution Preview: Solution 1 A sequence of characters which is encoded with the information to be transmitted can be easily identified like date or time is known as TimeStamps and in Kerberos it is in fractions of seconds Do you need an answer to a question different from the above?
Ask your question! Feedback :. Next Previous. Viewed 5k times. Could anyone please explain how timestamps in Kerberos protect from Replay attacks? Improve this question. Add a comment. Active Oldest Votes. Improve this answer. Vietnhi Phuvan Vietnhi Phuvan 2, 2 2 gold badges 23 23 silver badges 25 25 bronze badges. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name.
The use of the synchronized clocks keeps the property of statelessness within the design of the Kerberos protocol. Another advantage of having clocks as opposed to having another mechanism is that the clocks give security for the tickets issued by the Kerberos server. The tickets use a timestamp and expire after a certain amount of time has expired. A glaring disadvantage of using the loosely synchronized clocks is the potential for replays of an authenticator to be sent to a service.
0コメント