// Kerberos V5 A, G, C, S, U : principal N1, N2 : nonce L1, L2 : nonce T1start, T1expire : timestamp T2start, T2expire : timestamp Kcg, Kcs, Kag, Ku, Kgs : key 1. C -> A : U, G, L1, N1 2. A -> C : U, {U, C, G, Kcg, T1start, T1expire}Kag, {G, Kcg, T1start, T1expire}Ku 3. C -> G : S, L2, N2, {U, C, G, Kcg, T1start, T1expire}Kag, {C, T1}Kcg 4. G -> C : U, {U, C, S, Kcs, T2start, T2expire}Kgs, {S, Kcs, T2start, T2expire, N2}Kcg 5. C -> S : {U, C, S, Kcs, T2start, T2expire}Kgs, {C, T2}Kcs 6. S -> C : {T2}Kcs // Security Protocols Open Repository // http://www.lsv.ens-cachan.fr/spore ----------------------------------------------------------------------- This document was translated from LaTeX by HeVeA (http://pauillac.inria.fr/~maranget/hevea/index.html).