Question: a ) What are timing attacks, and how can they be avoided? Support your answer by providing an example for a safe and an unsafe

a) What are timing attacks, and how can they be avoided? Support your answer by
providing an example for a safe and an unsafe implementation of a function of
your choice.
[5 marks]
b) Youve been asked by the principal of your former secondary school to help her
assessing Kerberos as a possible authentication solution for the school IT
infrastructure (that includes both desktops/workstations and server resources). In
your response, explain in some detail, how Kerberos works, and how it would
allow authenticating users and controlling access to the schools server resources.
In your answer also comment on the security/robustness of Kerberos.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!