Kerberos

Jayvin Gohel
2 min readDec 10, 2022

--

Kerberos authentication protocol (KAP)

Kerberos is a network authentication protocol that is implemented for authenticating requests in computer networks. It is based on the client-server model, which uses an encryption technology and a “ticket” mechanism to prove the identity of a user on a non-secure network. Kerberos protocol messages protect the network from replay attacks and eavesdropping. It commonly uses public-key cryptography while authenticating users attempting to access the server.

~ The Kerberos protocol consists of the following steps: 

  • Step 1: A user sends his/her credentials to the authentication server.
  • Step 2: The authentication server hashes the password of the user and verifies the credentials with those in the active directory database. If the credential matches, then the authentication server (consisting of the ticket granting service (TGS)) sends back the TGS session key and ticket granting ticket (TGT) to the user to create a session. 
  • Step 3: Once users are authenticated, they send the TGT to request a service ticket to the server or TGS for accessing the services
  • Step 4: The TGS authenticates the TGT and grants a service ticket to the user, which consists of a ticket and a session key. 
  • Step 5: The client sends the service ticket to the server. The server uses its key to decrypt the information from the TGS and the client is authenticated to the server.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Jayvin Gohel
Jayvin Gohel

Written by Jayvin Gohel

Networking | cyber security | Ethical Hacking | OSINT | CTF | Malware analysis

No responses yet

Write a response