Security protocols, Other Subject

Assignment Help:

SECURITY PROTOCOLS

A security protocol (encryption protocol or cryptographic protocol) is a conceptual or actual protocol that performs a security-related utility and applies cryptographic methods.

Protocol defines how the algorithms should be used. Satisfactorily comprehensive protocol includes details about data representations and structures, at which position it can be used to apply multiple, interoperable versions of a program.

Cryptographic protocols are extensively used for protected application-level data transport. A cryptographic protocol regularly incorporates slightest some of these aspects:

  • Key agreement or concern
  • Entity verification
  • Symmetric encipher and message verification material construction
  • protected application-level data transport
  • Non-repudiation methods

For illustration, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity verification mechanism, based on the X.509 system; key setup phase, where a symmetric encryption key is produced by employing public-key cryptography; and an application-level data transport function. These three aspects have significant interconnections. Usual TLS does not have non-repudiation support.

There are other types of cryptographic protocols additionally, and even the term itself has a variety of dissimilar readings; Cryptographic application protocols frequently use one or more fundamental key agreement method, which are also occasionally they referred to as "cryptographic protocols". For example, TLS employs what is recognized as the Daffier-Hellman key exchange, which though it is only a part of TLS per se, Diffie-Hellman may be seen as a whole cryptographic protocol in itself for further applications.

Cryptographic protocols can sometimes be established formally on an abstract level.


Related Discussions:- Security protocols

The second sino-japanese war, Question 1 Why did China turn into an inform...

Question 1 Why did China turn into an informal colony? Question 2 What were the major reasons for the success and failure of the Boxer Rebellion? Question 3 Explai

Describe integrated solid waste management, By the late 1990s Kiribati was ...

By the late 1990s Kiribati was in a waste crisis. The primary problem was on South Tarawa, the capital, and home of approximately one half of the country's people. There were no en

Environmental health issues, Environmental Health Issues: A variety of pol...

Environmental Health Issues: A variety of pollutants present in the environment often lead to a pattern associated with the most common environmental health issues facing society.

Merits of peer counselling, Peer counselling is the process whereby motivat...

Peer counselling is the process whereby motivated and well-trained people undertake informal or organized activities with their peers (those similar to themselves in age, backgrou

What is psychopathology?, Psychopathology is a term which Denotes to either...

Psychopathology is a term which Denotes to either the study of mental illness or mental distress or the manifestation of behaviours and experiences of the human being ,which may be

Chemical engineering - process design, Problem Styrene can be produced by t...

Problem Styrene can be produced by the reactions: Ethylbenzene ! Styrene+H2 Ethylbenzene ! Benzene+Ethylene Ethylbenzene+H2 ! Toluene+CH4 The reactions take place at 600C and 1.7

Humanities, (TCOs 3 & 4) How have changes in technology affected the record...

(TCOs 3 & 4) How have changes in technology affected the recording industry and our understanding of what it means to be a professional musician? How have changes in technology aff

Behavioral studies of human language, Behavioral studies of human language ...

Behavioral studies of human language Today, there is a wealth of information about human language and the underlying neural mechanisms. A lot of that information has been accumu

Discuss the type of strategies that an organisation use, QUESTION (a) U...

QUESTION (a) Underlying the development of any service operations strategy is the concept of capacity management. Discuss the type of strategies that an organisation such as a

Save catalogue to file, Implement the save catalogue to file menu option....

Implement the save catalogue to file menu option.  After selecting this option the user should be asked to specify the name of the save file.  All the catalogue data should be st

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd