The
protocol messages of Kerberos are protected from the eavesdropping
and the replay attacks.
Kerberos is being built
on symmetric-key cryptography and required a third party which is a
trusted third party.
Also,
in some of the cases, public-key cryptography is being used for
authentication.
The
default port used by the Kerberos is 88.
The authentication
process of Kerberos is as follows:
Using
Kerberos, the client needs to send the request for the ticket to
the Key Distribution Centre (KDC) of Kerberos.
Then
from the key distribution center, a granting ticket is being issued
to the client and is encrypted by using the password of the client
as its key.
After
the encryption, the encrypted ticket-granting ticket (TGT) is being
sent back to the client.
In this
way, the Kerberos authentication system authenticates the process
of security.