Search results
Jump to navigation
Jump to search
- ...the IETF IPsec DOI.<ref name="rfc2409_sec1">{{Cite IETF|title=The Internet Key Exchange (IKE) |rfc=2409 |sectionname=1. Abstract}}</ref> ...fc2409_sec1"/> ISAKMP typically utilizes [[Internet Key Exchange|IKE]] for key exchange, although other methods have been implemented such as [[Kerberized ...5 KB (686 words) - 23:14, 5 March 2025
- |name = Telecoms & Internet converged Services & Protocols for Advanced Networks ...Protocol Harmonization Over Networks''' ('''TIPHON''') and '''Services and Protocols for Advanced Networks''' ('''SPAN'''). ...4 KB (495 words) - 06:59, 15 February 2025
- Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspec * [[Key agreement]] or establishment ...9 KB (1,258 words) - 07:59, 25 April 2025
- ...ort description|Framework for authentication and data security in Internet protocols}} ...ty layer. Application protocols that support SASL typically also support [[Transport Layer Security]] (TLS) to complement the services offered by SASL. ...7 KB (907 words) - 23:11, 18 June 2025
- '''Key generation''' is the process of generating keys in [[cryptography]]. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. A device or program used to generate keys is called a key generator or [[Key generator|keygen]]. ...5 KB (776 words) - 04:27, 19 May 2025
- ...n keys]] for multimedia sessions that are secured using [[Secure Real-time Transport Protocol|SRTP]], the security protocol commonly used for securing real-time ...tion. To do this, it shares a session key, known as the Traffic Encryption Key (TEK), between the participants of a communication session. Additionally, t ...8 KB (1,142 words) - 20:37, 23 January 2025
- This is one of the protocols analysed by Burrows, Abadi and Needham in the paper<ref>{{Cite journal|last These attacks leave the intruder with the session key and may exclude one of the parties from the conversation. ...5 KB (812 words) - 05:50, 17 February 2025
- ...ides [[multiplexing]] mechanisms that make it possible for several network protocols (e.g. [[Internet Protocol|IP]], [[IPX]] and [[DECnet]]) to coexist within a The LLC sublayer is primarily concerned with [[multiplexing]] protocols transmitted over the MAC layer (when transmitting) and demultiplexing them ...5 KB (764 words) - 21:36, 14 June 2025
- ...-protocols-118|title = An Overview of Different Authentication Methods and Protocols|date = 23 October 2001|access-date = 31 October 2015|website = www.sans.org ...tacks]] or [[Brute-force attack|brute-force attacks]]. Most authentication protocols are more complicated in order to be resilient against these attacks.<ref>{{ ...10 KB (1,431 words) - 23:19, 10 July 2024
- ...trying to talk to. In other words, it is the process of assuring that the key of "person A", held by "person B", does in fact belong to "person A" and vi ...There are various algorithms for both symmetric keys and asymmetric public key cryptography to solve this problem. ...4 KB (650 words) - 20:34, 18 October 2024
- {{Short description|Protocol for agreeing on a cryptographic key}} ...hereby two (or more) parties generate a cryptographic [[Key (cryptography)|key]] as a function of information provided by each honest party so that no par ...12 KB (1,683 words) - 16:52, 18 June 2025
- {{Short description|Key transport protocol}}[[File:Symetric Needham-Schroeder-Protocol – linear.svg|thumb|upr The '''Needham–Schroeder protocol''' is one of the two key transport protocols intended for use over an insecure network, both proposed by [[Roger Needham ...13 KB (2,069 words) - 08:04, 20 March 2024
- ...'') for Media Streams is a way to negotiate the key for [[Secure Real-time Transport Protocol]]. It has been proposed for standardization to the [[IETF]] in Jul ...ure that no one else can see the attachment. This can be done by using TLS transport layer, or other methods like S/MIME. Using TLS assumes that the next hop in ...5 KB (739 words) - 14:52, 16 June 2025
- {{short description|Security profile for Real-time Transport Protocol}} ...Real-time Transport Protocol''' ('''SRTP''') is a profile for [[Real-time Transport Protocol]] (RTP) intended to provide encryption, message [[authentication]] ...8 KB (1,224 words) - 19:42, 30 June 2025
- ...latform [[application software|application]] used to provide a universal [[Transport Layer Security|TLS/SSL]] [[Tunneling protocol|tunneling]] service. Stunnel uses [[public-key cryptography]] with [[X.509]] [[Public key certificate|digital certificates]] to secure the SSL connection, and client ...4 KB (578 words) - 10:43, 2 March 2024
- ...is used to carry encapsulated PPP packets, allowing the tunnelling of any protocols that can be carried within PPP, including [[Internet Protocol|IP]], [[NetBE ...as well as the integration between MPPE and PPP authentication for session key establishment.<ref>{{cite web|title=Malware FAQ: Microsoft PPTP VPN|url=htt ...8 KB (1,074 words) - 10:37, 22 April 2025
- ...r-to-peer]] communication over the [[Internet]] and applications using the protocols. Amicima's assets were acquired by [[Adobe Systems]] in late 2006. Amicima's base transport-layer protocol is the Secure Media Flow Protocol (MFP). ...3 KB (383 words) - 18:08, 6 May 2025
- '''Wireless Transport Layer Security''' ('''WTLS''') is a security protocol, part of the [[Wirele WTLS is derived from [[Transport Layer Security|TLS]]. WTLS uses similar semantics adapted for a low bandwid ...5 KB (738 words) - 05:05, 16 February 2025
- [[Quantum cryptography]], usually known as [[quantum key distribution]] (QKD) provides powerful security. But it has some limitation ...reas Poppe, Momtchil Peev, Oliver Maurhart, "Outline of the SECOQC Quantum-Key-Distribution Network in Vienna", Apr 2008, International Journal of Quantu ...3 KB (395 words) - 17:14, 29 January 2024
- {{Short description|Basic cryptographic algorithm used to build cryptographic protocols}}'''Cryptographic primitives''' are well-established, low-level [[cryptogra ...c primitives are one of the building blocks of every cryptosystem, e.g., [[Transport Layer Security|TLS]], [[Secure Sockets Layer|SSL]], [[Secure Shell|SSH]], e ...6 KB (923 words) - 05:08, 24 March 2025