Security protocols, Other Subject

Assignment Help:

SECURITY PROTOCOLS

A security protocol (encryption protocol or cryptographic protocol) is a conceptual or actual protocol that performs a security-related utility and applies cryptographic methods.

Protocol defines how the algorithms should be used. Satisfactorily comprehensive protocol includes details about data representations and structures, at which position it can be used to apply multiple, interoperable versions of a program.

Cryptographic protocols are extensively used for protected application-level data transport. A cryptographic protocol regularly incorporates slightest some of these aspects:

  • Key agreement or concern
  • Entity verification
  • Symmetric encipher and message verification material construction
  • protected application-level data transport
  • Non-repudiation methods

For illustration, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity verification mechanism, based on the X.509 system; key setup phase, where a symmetric encryption key is produced by employing public-key cryptography; and an application-level data transport function. These three aspects have significant interconnections. Usual TLS does not have non-repudiation support.

There are other types of cryptographic protocols additionally, and even the term itself has a variety of dissimilar readings; Cryptographic application protocols frequently use one or more fundamental key agreement method, which are also occasionally they referred to as "cryptographic protocols". For example, TLS employs what is recognized as the Daffier-Hellman key exchange, which though it is only a part of TLS per se, Diffie-Hellman may be seen as a whole cryptographic protocol in itself for further applications.

Cryptographic protocols can sometimes be established formally on an abstract level.


Related Discussions:- Security protocols

Emport export, What is the need for documents in international business? Su...

What is the need for documents in international business? Substantiate your answers with suitable examples.

Basic principles of information security - availability, A vailability ...

A vailability For every information system to provide its reason, the information must be existing when it is desirable. This way that the computing systems used to process an

#title. Organizational behaviour, how would you examine if there is any mer...

how would you examine if there is any meriyt in the remarks of various fuctional managers

Essay, write a descriptive narrative essay about the effect that a work of ...

write a descriptive narrative essay about the effect that a work of art such as a painting,a play, or a concert has had on you.

Why internet is insecure, WHY INTERNET IS INSECURE? Theft of Personal...

WHY INTERNET IS INSECURE? Theft of Personal information If you make use of the Internet, you may be facing serious danger as your private information such as name, addres

Major sociological theories of gender, Major Sociological Theories of Gende...

Major Sociological Theories of Gender: Each major sociological framework has its own views and theories regarding gender and why gender inequality exists. Feminist theorists also

Sub-disciplines within the classics, I need a report on Sub-disciplines wi...

I need a report on Sub-disciplines within the classics . Sub-disciplines within the classics report for about 2500 words? Would you able to assist me in report? Let me know cost o

Natural resources, Natural resources: Natural resources are substances tha...

Natural resources: Natural resources are substances that exist naturally in the earth and were not made by human beings. Natural resources are naturally occurring substances that

Fresh produce senescence problem, From the moment a fruit or vegetable was ...

From the moment a fruit or vegetable was harvested from its parent plant, it underwent a process of aging and eventual decay known as senescence. Senescence was marked by two main

Poetry, need help finding literary terms in a song

need help finding literary terms in a song

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd