[6999] in Kerberos

home help back first fref pref prev next nref lref last post

Re: kerberos security

daemon@ATHENA.MIT.EDU (William Boyer)
Wed Apr 3 14:19:47 1996

To: kerberos@MIT.EDU
Date: Wed, 03 Apr 1996 10:14:08 -0800
From: William Boyer <boyer.w@ghc.org>

Sam Hartman wrote:
> 
> mxer@kauri.vuw.ac.nz (Frank Jansen) writes:
> 
> >
> > Greetings,
> >           How secure are the session keys for kerberos V4 and V5 ? I hear that
> > DES , the encryption algorithm used by kerberos, is becoming vulnerable. Is
> > there an alternative available and usable in kerberos that will hold up
> > better ? Thanks in advance.
> 
>         No one has publically demonstrated they have broken DES yet.
> However, it wouldn't surprise me if it happened in a year or three.
> 
>         There is no solution for Kerberos4.  MIT's next version of
> Kerberos5 will likely support tripple-DES for most aspects of the
> protocol.  (Almost all the code is already written.)
> 
>         Unfortunately, MIT's Kerberos5 cannot be exported from the
> United States.  You will have to wait for someone to implement
> Kerberos5 outside the US in order to get a legal copy.
> 
>   >
> > -- > Frank Jansen, frank.jansen@vuw.ac.nz , Phone: +64 4 4965416 >
> Information Technology Services, * * Fax: +64 4 4715386 > Victoria
> University of Wellington, | > P.O. Box 600, Wellington, New Zealand.
> \___/ Callsign: ZL2TTS

The Jan'96 issue of Dr. Dobb's Journal is dedicated to compression and encryption. They talk about 2 
different cryptanalysis methods for breaking DES. You may want to check that issue out. May even be 
on their Web page http://www.ddj.com

Bill

home help back first fref pref prev next nref lref last post