开发者

Attacking synchronized clock protocol (Kerberos)

If we assume that an attacker is able to con开发者_运维技巧trol the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?


A detailed analysis of this was done in 2003 by Joel Weber.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜