1. Authentication using certi fi cates, although considered safe, suffers from weaknesses. Discuss these weaknesses using speci fi c examples.
2. Kerberos and SSL are additional layers to enhance authentication. Detail how these enhancements are achieved in both cases.