Fandom

The IT Law Wiki

Internet security protocol

32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definition Edit

Internet security protocols use various key management approaches, including: pre-shared keys (e.g., manually initialized, or communicating parties mutually derive a new key for data protection), public key cryptography (key agreement, key transport), and Key Distribution Centers (the KDC has a secret key for every subscriber, and generates and distributes a subscriber-subscriber data protection key using the KDC-subscriber keys).

Overview Edit

Nearly all Internet security protocols use cryptography for authentication, integrity and/or confidentiality, and hence, require key management (KM).

Also on Fandom

Random Wiki