Skip to Main Content
Express Learning: Cryptography and Network Security
book

Express Learning: Cryptography and Network Security

by ITL Education Solutions Limited
January 2012
Intermediate to advanced content levelIntermediate to advanced
196 pages
6h 43m
English
Pearson India
Content preview from Express Learning: Cryptography and Network Security

9

Network Security

1. Explain the working principle of the Kerberos protocol.

Ans.: Kerberos is an authentication protocol that has been designed to be used in an open distributed environment, where the users at workstations request for the services on the servers distributed throughout the network. It basically provides a centralized authentication server that is responsible for authenticating users to servers and servers to users. Its name has been derived from Greek mythology after the name of a three-headed dog that guarded the gates of Hades. Kerberos has become very popular as it can also act as a KDC in addition to being an authentication protocol. It was originally developed as a part of Project Athena at the MIT. Several versions ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CCNA Cyber Ops SECOPS 210-255

CCNA Cyber Ops SECOPS 210-255

Omar Santos
Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Publisher Resources

ISBN: 9788131764527