Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

5.1.6 What is Kerberos?

Kerberos [KNT94] is an authentication service developed by the Project Athena team at MIT, based on a 1978 paper by Needham and Schroeder [NS78]. The first general use version was version 4. Version 5, which addressed certain shortfalls in version 4, was released in 1994. Kerberos uses secret-key ciphers (see Question 2.1.2) for encryption and authentication. Version 4 could only use DES (see Section 3.2). Unlike a public-key authentication system, Kerberos does not produce digital signatures (see Question 2.2.2). Instead Kerberos was designed to authenticate requests for network resources rather than to authenticate authorship of documents. Thus, Kerberos does not provide for future third-party verification of documents.

In a Kerberos system, there is a designated site on each network, called the Kerberos server, which performs centralized key management and administrative functions. The server maintains a database containing the secret keys of all users, authenticates the identities of users, and distributes session keys to users and servers who wish to authenticate one another. Kerberos requires trust in a third party (the Kerberos server). If the server is compromised, the integrity of the whole system is lost. Public-key cryptography was designed precisely to avoid the necessity to trust third parties with secrets (see Question 2.2.1). Kerberos is generally considered adequate within an administrative domain; however across domains the more robust functions and properties of public-key systems are often preferred. There has been some developmental work in incorporating public-key cryptography into Kerberos [Gan95]

For detailed information on Kerberos, read ``The Kerberos Network Authentication Service (V5)'' (J. Kohl and C. Neuman, RFC 1510) at

Top of the page