The IT Law Wiki

Internet security protocol

32,081pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Internet security protocols use various key management approaches, including: pre-shared keys (e.g., manually initialized, or communicating parties mutually derive a new key for data protection), public key cryptography (key agreement, key transport), and Key Distribution Centers (the KDC has a secret key for every subscriber, and generates and distributes a subscriber-subscriber data protection key using the KDC-subscriber keys).

Overview Edit

Nearly all Internet security protocols use cryptography for authentication, integrity and/or confidentiality, and hence, require key management (KM).

Also on Fandom

Random Wiki