Kerberos uses the option C: DES encryption algorithm
Data security is ensured by robust encryption. But there aren't many ways to undermine Kerberos, according to security researchers. Attackers mimic clients by utilizing their credentials in a pass-the-key attack. Attackers use the ticket when KDC sends the session ticket in a "pass-the-ticket" attack.
Note that A symmetric key in cryptography is one that may be used to both encrypt and decode data. This implies that the encryption key used to encrypt the data must also be used to decrypt it.
Learn more about encryption algorithm from
https://brainly.com/question/9979590
#SPJ1
See options below
A. AES B. PKI
C. DES D. TGS