// Kerberos V5 
  
 A, G, C, S, U  :            principal 
 N1, N2  :                   nonce     
 L1, L2  :                   nonce     
 T1start, T1expire  :        timestamp 
 T2start, T2expire  :        timestamp 
 Kcg, Kcs, Kag, Ku, Kgs  :   key       
  
  
 1.   C -> A  :   U, G, L1, N1                                     
 2.   A -> C  :   U, {U, C, G, Kcg, T1start, T1expire}Kag,         
                  {G, Kcg, T1start, T1expire}Ku                    
 3.   C -> G  :   S, L2, N2, {U, C, G, Kcg, T1start, T1expire}Kag, 
                  {C, T1}Kcg                                       
 4.   G -> C  :   U, {U, C, S, Kcs, T2start, T2expire}Kgs,         
                  {S, Kcs, T2start, T2expire, N2}Kcg               
 5.   C -> S  :   {U, C, S, Kcs, T2start, T2expire}Kgs,            
                  {C, T2}Kcs                                       
 6.   S -> C  :   {T2}Kcs                                          
   
 // Security Protocols Open Repository 
 // http://www.lsv.ens-cachan.fr/spore 
   
-----------------------------------------------------------------------
  
   
              This document was translated from LaTeX by HeVeA
              (http://pauillac.inria.fr/~maranget/hevea/index.html).