1

This is a form of the Kerberos protocolenter image description here

I have two questions. Why does this protocol give the opportunity of a known plain-text attack because of no authentication of Joe? And how would an attacker perform a known plain-text attack?

nmq
  • 11
  • 1

0 Answers0