开发者

Attacking synchronized clock protocol (Kerberos)

开发者 https://www.devze.com 2023-01-09 09:42 出处:网络
If we assume that an attacker is able to con开发者_运维技巧trol the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?A detailed analysis o

If we assume that an attacker is able to con开发者_运维技巧trol the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?


A detailed analysis of this was done in 2003 by Joel Weber.

0

精彩评论

暂无评论...
验证码 换一张
取 消

关注公众号