skip to main content
article
Free Access

Limitations of the Kerberos authentication system

Published:01 October 1990Publication History
Skip Abstract Section

Abstract

The Kerberos authentication system, a part of MIT's Project Athena, has been adopted by other organizations. Despite Kerberos's many strengths, it has a number of limitations and some weaknesses. Some are due to specifics of the MIT environment; others represent deficiencies in the protocol design. We discuss a number of such problems, and present solutions to some of them. We also demonstrate how special-purpose cryptographic hardware may be needed in some cases.

Index Terms

  1. Limitations of the Kerberos authentication system

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGCOMM Computer Communication Review
                ACM SIGCOMM Computer Communication Review  Volume 20, Issue 5
                Oct 1 1990
                97 pages
                ISSN:0146-4833
                DOI:10.1145/381906
                Issue’s Table of Contents

                Copyright © 1990 Authors

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 October 1990

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader