Web YOUR DOMAIN NAME

CISSP Study Guide

This Blog is dedicated to help Serious IT Security Practitioners to pass the renowned CISSP exam. It is a must read for those going for the exam and needs total recall

Thursday, March 09, 2006

KERBEROS

  • Started as MIT's project Athena
  • Provides authentication and message protection
  • Uses symmetric key cryptography
  • Provides end-to-end security
  • Key Distribution Center(KDC)
    • Holds all cryptographic keys
  • Ticket
    • Generated by the KDC to authenticate a subject
  • Authentication service
    • Part of the KDC that authenticate subjects and objects
  • Kerberos Process
    • Subject submit requests to access object via KDC
    • KDC evaluates and sends Subject a Ticket
    • Subject submits ticket to object
    • Object examines ticket and grant subject access

0 Comments:

Post a Comment

<< Home