Describing use of kerberos for mutual authentication
Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication:
a. When Bob receives a ticket from Alice, how does he know it is genuine?
b. When Bob receives a ticket from Alice, how does he know it came from Alice?
c. Alice receives a reply, how does she know it came from Bob (that it is not a reply of an earlier message from Bob)?
d. What does the ticket contain that allows Alice and Bob to talk securely?
Is this the question you were looking for? If so, place your order here to get started!