Security protocols, Other Subject

SECURITY PROTOCOLS

A security protocol (encryption protocol or cryptographic protocol) is a conceptual or actual protocol that performs a security-related utility and applies cryptographic methods.

Protocol defines how the algorithms should be used. Satisfactorily comprehensive protocol includes details about data representations and structures, at which position it can be used to apply multiple, interoperable versions of a program.

Cryptographic protocols are extensively used for protected application-level data transport. A cryptographic protocol regularly incorporates slightest some of these aspects:

  • Key agreement or concern
  • Entity verification
  • Symmetric encipher and message verification material construction
  • protected application-level data transport
  • Non-repudiation methods

For illustration, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity verification mechanism, based on the X.509 system; key setup phase, where a symmetric encryption key is produced by employing public-key cryptography; and an application-level data transport function. These three aspects have significant interconnections. Usual TLS does not have non-repudiation support.

There are other types of cryptographic protocols additionally, and even the term itself has a variety of dissimilar readings; Cryptographic application protocols frequently use one or more fundamental key agreement method, which are also occasionally they referred to as "cryptographic protocols". For example, TLS employs what is recognized as the Daffier-Hellman key exchange, which though it is only a part of TLS per se, Diffie-Hellman may be seen as a whole cryptographic protocol in itself for further applications.

Cryptographic protocols can sometimes be established formally on an abstract level.

Posted Date: 10/12/2012 9:24:29 AM | Location : United States







Related Discussions:- Security protocols, Assignment Help, Ask Question on Security protocols, Get Answer, Expert's Help, Security protocols Discussions

Write discussion on Security protocols
Your posts are moderated
Related Questions
What American Indian group made the canoe


Early Anthropological Theory- exemplified by Edward Tylor (1832 - 1917). Tylor was a Quaker, with no formal university training, who traveled Mexico from 1855-56, began publishing


I was wondering if you give quotes for MCAT tutor help in preparing for the exam? I may need someone from July - August. My exam is scheduled on Sept 7th so I need to be ready and

Principles of Feminist Research: It is often taken for granted that feminist research takes an anti-quantitative attitude and therefore abstains from all quantitative standards an

How does the northern renaissance differ from the southern renaissance? Do your experts provide northern renaissance and southern renaissance Questions assignment help? I n

What does the negative coefficient on the quadratic term imply about the relationship between birth weight and prenatal visits? Does the sign make sense? Explain. Answer: The fl

Question: The field of social and organisational psychology explores different aspects of the application of the study of human behaviour at the workplace. (a) Give a brief

You are to design a 2016 presidential campaign for Hillary Clinton. Consult the INTERNET for background material. 1) Determine what the theme will be for the campaign 2)