• Simple Symmetric Transport Protocol (SSTP) is a protocol for delivering messages between clients and servers. It is used by Microsoft Groove. Peer-to-Peer:...
    771 bytes (54 words) - 22:56, 6 November 2021
  • Thumbnail for Needham–Schroeder protocol
    Needham–Schroeder Symmetric Key Protocol, based on a symmetric encryption algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish...
    13 KB (2,192 words) - 08:04, 20 March 2024
  • Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The...
    178 KB (17,519 words) - 19:55, 15 June 2025
  • Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) is a standardized set of methods, including a network protocol,...
    8 KB (1,059 words) - 16:34, 19 December 2023
  • Entity authentication Symmetric encryption and message authentication material construction Secured application-level data transport Non-repudiation methods...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Thumbnail for Network Time Protocol
    typically 4. Mode: 3 bits Association mode: 0 = reserved 1 = symmetric active 2 = symmetric passive 3 = client 4 = server 5 = broadcast 6 = control 7 =...
    63 KB (6,444 words) - 10:14, 19 June 2025
  • Secure Socket Tunneling Protocol, a form of virtual private network (VPN) tunnel Simple Symmetric Transport Protocol, a protocol for delivering messages...
    615 bytes (98 words) - 09:15, 9 May 2021
  • an anonymous key agreement protocol. Symmetric key agreement (SKA) is a method of key agreement that uses solely symmetric cryptography and cryptographic...
    12 KB (1,473 words) - 16:52, 18 June 2025
  • process itself is much more complicated than in the previous protocols - Kerberos uses symmetric key cryptography, requires a trusted third party and can...
    10 KB (1,192 words) - 23:19, 10 July 2024
  • (SSH) Transport Layer Protocol (July 2012) RFC 7479 – Ed25519 SSHFP Resource Records (March 2015) RFC 5592 – Secure Shell Transport Model for the Simple Network...
    41 KB (4,509 words) - 06:22, 11 June 2025
  • Thumbnail for Network address translation
    reliably across symmetric NATs or other poorly behaved legacy NATs. Other possibilities are Port Control Protocol (PCP), NAT Port Mapping Protocol (NAT-PMP)...
    44 KB (5,558 words) - 10:01, 17 June 2025
  • same protocol name but a different set of cryptographic operations then bad interactions could occur. Pre-shared symmetric keys: Pre-shared symmetric keys...
    75 KB (6,873 words) - 05:17, 13 June 2025
  • Thumbnail for Public-key cryptography
    Public-key cryptography (category Cryptographic protocols)
    cryptography can be too slow for many purposes, so these protocols often combine symmetric cryptography with public-key cryptography in hybrid cryptosystems...
    40 KB (4,510 words) - 15:13, 16 June 2025
  • Thumbnail for Diffie–Hellman key exchange
    Diffie–Hellman key exchange (category Key-agreement protocols)
    method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle...
    47 KB (5,367 words) - 13:57, 12 June 2025
  • Thumbnail for Key Management Interoperability Protocol
    controls Managed Objects like symmetric and asymmetric keys, certificates, and user defined objects. Clients then use the protocol for accessing these objects...
    16 KB (1,698 words) - 17:37, 8 June 2025
  • up attacks against symmetric ciphers, doubling the key size can effectively counteract these attacks. Thus post-quantum symmetric cryptography does not...
    63 KB (6,418 words) - 03:08, 19 June 2025
  • authentication of the Simple Network Management Protocol (SNMP) version 2. Authentication Header (AH) is a member of the IPsec protocol suite. AH ensures...
    44 KB (5,337 words) - 03:03, 15 May 2025
  • specification is defined in several layers: (i) a type system, (ii) a symmetric, asynchronous protocol for the transfer of messages from one process to another, (iii)...
    24 KB (2,669 words) - 04:06, 15 February 2025
  • Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key...
    32 KB (3,542 words) - 08:07, 13 June 2025
  • SDSL—Symmetric DSL SE—Single Ended SEI—Software Engineering Institute SEO—Search Engine Optimization SFTP—Secure FTP SFTP—Simple File Transfer Protocol SFTP—SSH...
    92 KB (6,595 words) - 12:30, 13 June 2025
  • Thumbnail for Bluetooth
    when necessary. The adopted protocols include: Point-to-Point Protocol (PPP) Internet standard protocol for transporting IP datagrams over a point-to-point...
    136 KB (14,080 words) - 02:35, 18 June 2025
  • authenticator. See the #Examples section for details. A symmetric key is a shared secret used to perform symmetric-key cryptography. The claimant stores their copy...
    30 KB (3,661 words) - 07:54, 24 May 2025
  • Thumbnail for Encryption
    cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use simple modular arithmetic...
    34 KB (3,645 words) - 07:39, 2 June 2025
  • networks, transport reliability under the end-to-end principle is the responsibility of the transport protocols, such as the Transmission Control Protocol (TCP)...
    10 KB (1,351 words) - 22:49, 3 September 2024
  • IEEE 802.1aq (category Link protocols)
    IEEE 802.1ad and transported only to other members of VLAN. Unicast, multicast, and broadcast are supported and all routing is on symmetric shortest paths...
    91 KB (11,316 words) - 13:41, 24 May 2025
  • Thumbnail for Public key infrastructure
    Public key infrastructure (category Transport Layer Security)
    Management Protocol (CMP) Certificate Management over CMS (CMC) Simple Certificate Enrollment Protocol (SCEP) Enrollment over Secure Transport (EST) Automatic...
    35 KB (4,124 words) - 20:07, 8 June 2025
  • Thumbnail for Forward secrecy
    Forward secrecy (category Transport Layer Security)
    Forward secrecy protects data on the transport layer of a network that uses common transport layer security protocols, including OpenSSL, when its long-term...
    26 KB (3,047 words) - 02:37, 21 May 2025
  • Protocol • Signal Intelligence Service • Signcryption • SIGSALY • SILC (protocol) • Silvio Micali • Simple Authentication and Security Layer • Simple...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Thumbnail for GNUnet
    encrypted with a symmetric key derived from H ( B ) {\displaystyle H(B)} when they are stored in the network. GNUnet Anonymity Protocol consists of queries...
    20 KB (2,141 words) - 18:57, 2 April 2025
  • The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...
    28 KB (3,404 words) - 16:06, 8 December 2024