August 2019
Intermediate to advanced
786 pages
20h 22m
English
The Kerberos protocol is built to protect authentication between the server and the client in an open network. The main concept behind authentication is that two parties first agree on a password (secret) and then use it to both identify and verify their genuineness:

In the preceding example, Dave and server A have regular communications. They often exchange confidential data. In order to protect this communication, they agree to use a common secret code (1234) to verify their identities before exchanging data. When Dave makes initial communication, he passes his secret to server A and says Hey! I'm Dave. Then, server ...