Kerberos is a computer network authentication protocol that allows individuals communicating
over a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.
A.
Kerberos requires continuous availability of a central server.
B.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
C.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the
subject’spasswords.
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
Explanation: