If we assume that an attacker is able to con开发者_运维技巧trol the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?
A detailed analysis of this was done in 2003 by Joel Weber.
If we assume that an attacker is able to con开发者_运维技巧trol the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?
A detailed analysis of this was done in 2003 by Joel Weber.
精彩评论