- Understand the Protocol/Algorithm
- Under security of the Protocol/Algorithm
- Under the message formats used in the Protocol/Algorithm
- Implement the Algorithm using the message formats referring RFC Specification for the Protocol.
- Run the Protocol in different Virtual Machines
- Test for Vulnerabilities and Security Issues (Basic Attacks)
The following figure shows the basic workflow of Kerberos Authentication Protocol.
Two part process for availing a service:
- firstly, Authenication with KDC and receiving Tickets
- secondly, availing the service by using the Tickets
Messages are exchanged by Client with three other entities:
- Authentication Server(AS)
- Ticket Granting Server(TGS)
- Service Server (S)