Kerberos Encryption Types

Instructor: David Gloag

David has over 40 years of industry experience in software development and information technology and a bachelor of computer science

Security is important in today's world. Events such as the Olympics bring it front and center. In this lesson, we'll take a look at Kerberos Encryption and the encryption types associated with it.

The Need to Be Safe

Our world can be a dangerous place. It seems that we routinely read of terrorists threatening violence or of thieves wielding knives or guns. Even schoolyard bullies attempt to force us to see things their way. These are sad occurrences, and we do what we must to address them. But what if the attack is hidden from our eyes? What if the attack occurs in a digital frontier, like the Internet? The truth is it does, and quite often! Fortunately, there are technologies like encryption, and Kerberos, to keep us safe.

What is Encryption?

Encryption is a technology synonymous with protection. It hides information, and protects it from malicious intent. Using a mathematically based algorithm, and an external piece of information known as a key, it converts information from one representation to another. Your credit card uses it to secure account information. Your favorite e-commerce website uses it to protect purchase transactions, and your LinkedIn account uses it to hide your password. Encryption is everywhere, you just don't realize it. Silently and efficiently, it goes about its business.

What is Kerberos?

Kerberos is a front-line network authentication method developed by the Massachusetts Institute of Technology (MIT) in the early 1980s. It is a process for determining whether an individual is authorized for general entrance into a system, and whether they have access rights to particular resources belonging to the system. As an example, Microsoft SharePoint, RedHat Linux, and the MongoDB all support using Kerberos as part of their product offering. This is not surprising as Kerberos provides strong authentication, meaning that it can't easily be broken or compromised. It has become an industry standard for network access and authentication.

What are the Types of Kerberos Encryption?

Kerberos supports a number of encryption types. They fall into four categories, or base types.

To unlock this lesson you must be a Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use

Become a member and start learning now.
Become a Member  Back
What teachers are saying about
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account