Answered step by step
Verified Expert Solution
Question
1 Approved Answer
The following figures show two scenarios. In the first, Alice has already obtained a TGT , and uses this TGT to ask KDC for a
The following figures show two scenarios. In the first, Alice has already obtained a TGT and uses this TGT to ask KDC for a key to talk to Bob. In the second, Alice obtains KAB and the ticket to Bob, and talks to Bob by sending him the ticket obtained from KDC Explain the reason why the authenticator does not have security value in the first figure, and why the authenticator has security value in the second figure when Alice talks to Bob
Remember that the purpose of the authenticator, as its name indicates, is used for the other party, ie KDC in the first figure and Bob in the second figure, to authenticate Alice.
When answering this question, you want to explain: why the authenticator is not necessary in the first figure; and what can happen if the authenticator is not used in the second figure.
Note that we only discuss authentication in this question. When the authentication is done, AliceKDC and AliceBob may or may not encrypt the following messages. Do not assume the keys shared between AliceKDC and AliceBob will be used to encrypt any message not displayed in these figures. Only discuss the significance of the authenticator based on what is shown in these figures.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started