An authentication system developed at the Massachusetts Institute of Technology (MIT). Kerberos is designed to enable two parties to exchange private information across a public network.
Source(s):
NIST SP 1800-25B
from
NIST SP 800-47
NIST SP 1800-26B
from
NIST SP 800-47
NIST SP 800-47
[Superseded]
A widely used authentication protocol developed at MIT. In “classic” Kerberos, users share a secret password with a Key Distribution Center (KDC). The user (Alice) who wishes to communicate with another user (Bob) authenticates to the KDC and the KDC furnishes a “ticket” to use to authenticate with Bob.
See SP 800-63C Section 11.2 for more information.
Source(s):
NIST SP 800-63-3
A network authentication protocol that is designed to provide strong authentication for client/server applications by using symmetric-key cryptography.
Source(s):
NIST SP 800-57 Part 2 Rev.1
A means of verifying the identities of principals on an open network. Kerberos accomplishes this without relying on the authentication, trustworthiness, or physical security of hosts while assuming all packets can be read, modified and inserted at will. Kerberos uses a trust broker model and symmetric cryptography to provide authentication and authorization of users and systems on the network.
Source(s):
NIST SP 800-95
from
IETF RFC 1501
A widely used authentication protocol developed at MIT. In “classic” Kerberos, users share a secret password with a Key Distribution Center (KDC). The user, Alice, who wishes to communicate with another user, Bob, authenticates to the KDC and is furnished a “ticket” by the KDC to use to authenticate with Bob.
Source(s):
NIST SP 800-63-2
[Superseded]