8 Appendix: Symmetric Key- Distribution 7 Acknowledgements 3.5 Passphrase Quality 4 Transferring Administrative Burdens 3.3 Certiicate Revocation Lists 3.4 Private-key Management 3.1 Authenticating the User 3.2 Authenticating the Ca Compliance Defects in Public-key Cryptography

@inproceedings{Steiner19968AS,
  title={8 Appendix: Symmetric Key- Distribution 7 Acknowledgements 3.5 Passphrase Quality 4 Transferring Administrative Burdens 3.3 Certiicate Revocation Lists 3.4 Private-key Management 3.1 Authenticating the User 3.2 Authenticating the Ca Compliance Defects in Public-key Cryptography},
  author={Jennifer G. Steiner and Clifford Neuman and Jeffrey I. Schiller and Dan Geer and Barry Jaspan and Win Treese and Jon Gossels and Karl Andersen and Brad Johnson and James Anderson and Roger M. Needham and Michael Burrows and Mart{\'i}n Abadi and Charlie Kaufman and Radia Perlman and Matthew Spencer and Don Davis},
  year={1996}
}
A symmetric Key-Distribution Center is a trusted server that knows each user's password. The KDC issues temporary session-keys to users who know their passwords. Each user's initial session-key comes to him under his password's encryption. The KDC then uses this initial key to encrypt the user's subsequent session keys. 1. Account-Creation: The user proves his identity to the KDC's administrator not electronically. The administrator creates an initial password for the user, and tells the user… CONTINUE READING