[912] in Kerberos
Authentication methods of Kerberos...
daemon@ATHENA.MIT.EDU (Peter Wayner)
Tue Apr 17 10:09:37 1990
Date: Tue, 17 Apr 90 10:03:49 -0400
From: wayner@SVAX.CS.CORNELL.EDU (Peter Wayner)
To: kerberos@ATHENA.MIT.EDU
I realize this question has been asked before, but I've discarded the
letters which had the answers...
Q: What system does Kerberos use to authenticate a user? Is it Public-Key
algorithms or some Zero-Knowledge system? What algorithms are then
used to encrypt everything else passing over the wires?
Q: What are some good introductory articles on Kerberos?
Thanks for answering,
Peter Wayner
(wayner@cs.cornell.edu)