The document discusses key distribution and authentication using symmetric encryption. It describes several options for distributing symmetric keys between two parties, including having a third party select and deliver the key. The most preferable option is using a key distribution center (KDC) that can dynamically provide session keys for encryption between hosts that have been granted permission to communicate. The document then provides details on how Kerberos, a widely used authentication system, implements this approach using a KDC, ticket granting tickets, and service granting tickets to authenticate users and allow secure communication without transmitting plaintext passwords. It also summarizes some of the environmental and technical deficiencies addressed in the updated Kerberos version 5 protocol.