1. In the Needham-Schroeder protocol, Alice generates two challenges, RAand RA2. This seems like overkill. Would one not have done the job?
2. Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here