In Kerberos, Alice's key KA, which is shared by Alice and the KDC, is computed (on Alice's computer) as KA= /i(Alice's password). Alternatively, this could have been implemented as follows. Initially, the key KAis randomly generated on Alice's computer. The key is stored on Alice's computer as E(KA, K) where the key K is computed as K = h(Alice's password). The key KAis also stored on the KDC.
a. What are the advantages to this alternate approach of generating and storing KA?
b. Are there any disadvantages to computing and storing E(KA, K)l
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here