just wondering what this qn means and whats the answer.
Many security tools/protocols/mechanisms, such as Kerberos V5, allow for more than one crypto-
graphic algorithm to take any particular role, such as encryption. Why do they do this, rather than
requiring the use of a particular algorithm, say AES, all the time?