Security protocols, Other Subject

Assignment Help:

SECURITY PROTOCOLS

A security protocol (encryption protocol or cryptographic protocol) is a conceptual or actual protocol that performs a security-related utility and applies cryptographic methods.

Protocol defines how the algorithms should be used. Satisfactorily comprehensive protocol includes details about data representations and structures, at which position it can be used to apply multiple, interoperable versions of a program.

Cryptographic protocols are extensively used for protected application-level data transport. A cryptographic protocol regularly incorporates slightest some of these aspects:

  • Key agreement or concern
  • Entity verification
  • Symmetric encipher and message verification material construction
  • protected application-level data transport
  • Non-repudiation methods

For illustration, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity verification mechanism, based on the X.509 system; key setup phase, where a symmetric encryption key is produced by employing public-key cryptography; and an application-level data transport function. These three aspects have significant interconnections. Usual TLS does not have non-repudiation support.

There are other types of cryptographic protocols additionally, and even the term itself has a variety of dissimilar readings; Cryptographic application protocols frequently use one or more fundamental key agreement method, which are also occasionally they referred to as "cryptographic protocols". For example, TLS employs what is recognized as the Daffier-Hellman key exchange, which though it is only a part of TLS per se, Diffie-Hellman may be seen as a whole cryptographic protocol in itself for further applications.

Cryptographic protocols can sometimes be established formally on an abstract level.


Related Discussions:- Security protocols

Greek art, Greek Art: Greek art (or, more properly, art in Greece) started...

Greek Art: Greek art (or, more properly, art in Greece) started in the Minoan and Cycladic pre-historical civilizations, and origin of Western classical art in the subsequent Geom

Neurological and neurovascular observations, Neurological - Neurological ob...

Neurological - Neurological observation is the collection of information on a patient's central nervous system this consisting of the brain and spinal cord. Neurovascular - Neur

Life cycle of rawmaterial, What is the life cycle period of raw material fo...

What is the life cycle period of raw material for manufacturing sectors

Study, Do you have global english assigment''s answers? Please

Do you have global english assigment''s answers? Please

Mouth and esophagus - structure of the digestive system, The mouth is the b...

The mouth is the beginning of the digestive tract; and, in fact, digestion starts here when taking the first bite of food. Chewing breaks the food into pieces that are more easily

Virtual terminal, VI R TUA L TERMINAL In open systems, a virtual te...

VI R TUA L TERMINAL In open systems, a virtual terminal ( VT ) is a submission service that: 1.   Allows host terminals on a multi-user network to work together with ot

Territorial morphology, Define the notion of state territorial morphology a...

Define the notion of state territorial morphology and discuss its application to Cambodia, Malaysia and Thailand, respectively as compact, fragmented and protruded states. Guide

Government and public affairs, For this task, complete the following: Choo...

For this task, complete the following: Choose an example of how the government has impacted public policy. For example: Social Security Act, the Affordable Care Act, the 18th Amen

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd