views:

45

answers:

1

If we assume that an attacker is able to control the clock of Alice, Bob, and the KDC (key distribution center) how could the attacker attack the Kerberos protocol?

+4  A: 

A detailed analysis of this was done in 2003 by Joel Weber.

Rob Napier