Why are timestamps used in the kerberos protocol

Assignment Help Computer Network Security
Reference no: EM13191903

Why are timestamps used in the Kerberos protocol? 

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory. This message needn't be encrypted since confidentiality is not important here, but the CEO needs to be guaranteed that the message really is from someone who knows the secret s (e.g. Alice) when the CEO opens his/her computer the next day. A naïve protocol to achieve this may look like this: 

Alice-->Server: "This is Alice, I have an important message to forward to the CEO"
Server-->Alice: "OK, please encrypt R" (where R is a random nonce)
Alice-->Server: "Es(R)" (that is, R is encrypted with the secret s)
Server-->Alice: "Please send the message"
Alice-->Server: "The CEO needs to attend a meeting in Liverpool on May 1, 2006"
The server stores this message in the CEO's directory

Is this protocol secure? If not, how do you feel it could be modified to make it so?

Reference no: EM13191903

Questions Cloud

Determine the value of the loan if the nominal rate given : monthly payments on a loan is $1000 for the next 10 years. Determine the value of the loan if the nominal rate 6% compounded monthly. if we want to pay the loan in 50 months what is the monthly payment
Find the probability that the player will get atmost 26 hits : If a baseball player's batting average is 32 %, find the probability that the player will get atmost 26 hits at 100 times at bat.
State dehydrohalogentation of tert-butyl chloride : Do the same to show the formation of both elimination products from 2-bromo-2methylbutane (page 208 lists the two products as 2-methyl-1-butene and 2-methyl-2-butene.)
Does ben consume equal amounts of x and y : Suppose Ben has a utility function U(x,y)= 4 * x^(0.5) * y^(0.8) The price of x is 2 dollars and the price of y is also 2 dollars. Explain WITHOUT USING ANY MATH AT ALL, just in a few words, which good is consumed more. Does Ben buy more x than y.
Why are timestamps used in the kerberos protocol : Why are timestamps used in the Kerberos protocol - When Alice is on a trip, she tries to store an important message in the CEO's account directory.
Which pair has equally likely outcomes : Which pair has equally likely outcomes? Check the two choices below which have equal probabilities of success. A standard deck of cards has 12 face cards and four Aces (Aces are not face cards).
Compute the atomic mass of the metal : the water level in the collecting vessel is the same as the outside level. Atmospheric pressure is 756.0 Torr and the temperature is 25 degrees C. Calculate the atomic mass of the metal.
Use the counting principle to determine the number : A mini license plate for a toy car must consist of a vowel followed by two numbers. Each number must be a 1 or 6. Repetition of digits is permitted.
The federal court system was established : The federal court system was established by:

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  Most threatening security issues firms have to deal with

Research current security trends, countermeasures, and threats. What will be the most threatening security issues firms have to deal with within the next five years?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Differentiate business continuity-disaster recovery planning

Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Information security breaches

What special consequences do you foresee from information security breaches confined to online retail banking compared to online commercial banking?

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd