What problem was Kerberos designed to address? What four requirements were defined

What problem was Kerberos designed to address?

What four requirements were defined for Kerberos?

Reference the suppress-replay attack described in Section 15.2 to answer the following.

Give an example of an attack when a party’s clock is ahead of that of the KDC.

Give an example of an attack when a party’s clock is ahead of that of another party.

There are three typical ways to use nonces as challenges. Suppose Na is a nonce generated by A, A and B share key K, and f() is a function (such as an increment). The three usages are: Describe situations for which each usage is appropriate.

Provide a brief definition of network access control.

List and briefly define four EAP authentication methods.

1