Question: Suppose that the attacker can eavesdrop on an initial 2-message exchange, where a Kerberos client requests the ticket-granting ticket (TGT), and receives one from

Suppose that the attacker can eavesdrop on an initial 2-message exchange, where  

Suppose that the attacker can eavesdrop on an initial 2-message exchange, where a Kerberos client requests the ticket-granting ticket (TGT), and receives one from the Kerberos KDC. 1. Explain how the attacker can mount an off-line dictionary attack. 2. How would you modify the protocol for requesting the TGT to prevent such offline dictionary attacks?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 Offline Dictionary Attack In a Kerberos authentication process the initial 2message exchange involves the client requesting a ticketgranting ticket ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!