What problem was Kerberos designed to address?
What four requirements were defined for Kerberos?
Reference the suppress-replay attack described in Section 15.2 to answer the following.
Give an example of an attack when a party’s clock is ahead of that of the KDC.
Give an example of an attack when a party’s clock is ahead of that of another party.
There are three typical ways to use nonces as challenges. Suppose Na is a nonce generated by A, A and B share key K, and f() is a function (such as an increment). The three usages are: Describe situations for which each usage is appropriate.
Provide a brief definition of network access control.
List and briefly define four EAP authentication methods.
1