fjames86 / cerberus

Common Lisp Kerberos v5 implementation
MIT License
5 stars 2 forks source link

AES256 implementation #2

Open Vsevosemnog opened 3 years ago

Vsevosemnog commented 3 years ago

Good day.

I am searching for detailed AES256 kerberos algorithm implementation. I am interested espeсially in nfold algorithm in it. I know, how nfold algorithm works, but it is very important for me to know, which constants except string "kerberos" are used in key derivation with the help of nfold algorithm. I have heard that these constants depends on the type of traffic packet (AS_REG, AS_REP, TGS_REP)

Could you please help to find it, it is very important?

fjames86 commented 3 years ago

Hi I am not sure what constants you are referring to. You could try reading RFCs 3961 (for n-fold definition) or 3962 (for AES profile definitions). The definition from the RFC only mentions constant "kerberos":

tkey = random2key(PBKDF2(passphrase, salt, iter_count, keylength)) key = DK(tkey, "kerberos")