In Kerberos, Alice's key K A , which is shared by Alice and the KDC, is computed (on Alice's computer) as K A = /i(Alice's password). Alternatively, this could have been implemented as follows....


In Kerberos, Alice's key KA, which is shared by Alice and the KDC, is computed (on Alice's computer) as KA
= /i(Alice's password). Alternatively, this could have been implemented as follows. Initially, the key KA
is randomly generated on Alice's computer. The key is stored on Alice's computer as E(KA, K) where the key K is computed as K = h(Alice's password). The key KA
is also stored on the KDC.


 a. What are the advantages to this alternate approach of generating and storing KA?


b. Are there any disadvantages to computing and storing E(KA, K)l



Dec 09, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here