Does any real world protocol makes use of the associated data in AEAD?

I’m trying to find evidence of use of the associated data (authenticated cleartext associated with the encrypted and authenticated data) feature offered by AEAD (Authenticated Encryption with Associated Data) construction in a real world p… Continue reading Does any real world protocol makes use of the associated data in AEAD?

Is there a way to filter RFCs for what would constitute minimum allowed TCP/UDP traffic for functioning of web applications? [closed]

In my search for a comprehensive list of implemented RFC’s as pertaining to TCP/UDP traffic, I’ve come across RFC 7414 – but it only provides links and only for TCP. Is there any project that either meta-analyzed these, or that has been ma… Continue reading Is there a way to filter RFCs for what would constitute minimum allowed TCP/UDP traffic for functioning of web applications? [closed]

Why is the authentication server needed in the Kerberos protocol

Consider the diagram in https://en.wikipedia.org/wiki/Kerberos_(protocol)#/media/File:Kerberos_protocol.svg depicting the Kerberos protocol.
I’m wondering how the authentication server (AS) is useful.. Couldn’t we drop the messages A, B, C… Continue reading Why is the authentication server needed in the Kerberos protocol