Kerberos (https://web.mit.edu/kerberos/www/) and PKI (some codes for certificate authority could be downloaded from https://www.openca.org/) can all be used to generate session keys for secure communication.What are the pros and cons of each method?If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?
- Paper must contain 350 words- 3 Citing & referencing required- Harvard referencing style:https://www.harvardgenerator.com/