Kerberos Authentication Process (Strength & Weakness)

   Items      that should be addressed include, but are not limited to: Strengths       of this authentication protocol. Weaknesses       of this authentication protocol. Description       of algorithm to implement Kerberos. Relevant       examples of modern applications that utilize Kerberos.