Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication:

a. When Bob receives a ticket from Alice, how does he know it is genuine?

b. When Bob receives a ticket from Alice, how does he know it came from Alice?

c. Alice receives a reply, how does she know it came from Bob (that it is not a reply of an earlier message from Bob)?

d. What does the ticket contain that allows Alice and Bob to talk securely?

You may also like...