Kerberos: This validation protocol provides robust authentication for client-server-based applications through encryptionEncryption is the process by which data is made illegible and unusable for unauthorized viewers. In order to use or read encrypted data, you must decrypted will. A secret key is required for this. There are two types of top-level encryption: symmetrical and asymmetrical . In the symmetric encryption the same key is used to encrypt and decrypt the data.... with secret keys. Kerberos assumes that all endpoints within a network are insecure. It therefore enforces strong encryption for all communication and all data at all times.