Fandom

The IT Law Wiki

Internet security protocol

32,494pages on
this wiki
Add New Page
Talk0 Share

Definition Edit

Internet security protocols use various key management approaches, including: pre-shared keys (e.g., manually initialized, or communicating parties mutually derive a new key for data protection), public key cryptography (key agreement, key transport), and Key Distribution Centers (the KDC has a secret key for every subscriber, and generates and distributes a subscriber-subscriber data protection key using the KDC-subscriber keys).

Overview Edit

Nearly all Internet security protocols use cryptography for authentication, integrity and/or confidentiality, and hence, require key management (KM).

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.