Simple Symmetric Transport Protocol (SSTP) is a protocol for delivering messages between clients and servers. It is used by Microsoft Groove. Peer-to-Peer:...
771 bytes (54 words) - 22:56, 6 November 2021
Needham–Schroeder Symmetric Key Protocol, based on a symmetric encryption algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish...
13 KB (2,192 words) - 08:04, 20 March 2024
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The...
178 KB (17,519 words) - 19:55, 15 June 2025
STUN (redirect from Simple traversal of UDP over NATs (STUN))
Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) is a standardized set of methods, including a network protocol,...
8 KB (1,059 words) - 16:34, 19 December 2023
Entity authentication Symmetric encryption and message authentication material construction Secured application-level data transport Non-repudiation methods...
9 KB (1,015 words) - 07:59, 25 April 2025
typically 4. Mode: 3 bits Association mode: 0 = reserved 1 = symmetric active 2 = symmetric passive 3 = client 4 = server 5 = broadcast 6 = control 7 =...
63 KB (6,444 words) - 10:14, 19 June 2025
Secure Socket Tunneling Protocol, a form of virtual private network (VPN) tunnel Simple Symmetric Transport Protocol, a protocol for delivering messages...
615 bytes (98 words) - 09:15, 9 May 2021
an anonymous key agreement protocol. Symmetric key agreement (SKA) is a method of key agreement that uses solely symmetric cryptography and cryptographic...
12 KB (1,473 words) - 16:52, 18 June 2025
process itself is much more complicated than in the previous protocols - Kerberos uses symmetric key cryptography, requires a trusted third party and can...
10 KB (1,192 words) - 23:19, 10 July 2024
Secure Shell (redirect from Secure Shell Protocol)
(SSH) Transport Layer Protocol (July 2012) RFC 7479 – Ed25519 SSHFP Resource Records (March 2015) RFC 5592 – Secure Shell Transport Model for the Simple Network...
41 KB (4,509 words) - 06:22, 11 June 2025
Network address translation (redirect from Symmetric NAT)
reliably across symmetric NATs or other poorly behaved legacy NATs. Other possibilities are Port Control Protocol (PCP), NAT Port Mapping Protocol (NAT-PMP)...
44 KB (5,558 words) - 10:01, 17 June 2025
same protocol name but a different set of cryptographic operations then bad interactions could occur. Pre-shared symmetric keys: Pre-shared symmetric keys...
75 KB (6,873 words) - 05:17, 13 June 2025
Public-key cryptography (category Cryptographic protocols)
cryptography can be too slow for many purposes, so these protocols often combine symmetric cryptography with public-key cryptography in hybrid cryptosystems...
40 KB (4,510 words) - 15:13, 16 June 2025
Diffie–Hellman key exchange (category Key-agreement protocols)
method of securely generating a symmetric cryptographic key over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle...
47 KB (5,367 words) - 13:57, 12 June 2025
controls Managed Objects like symmetric and asymmetric keys, certificates, and user defined objects. Clients then use the protocol for accessing these objects...
16 KB (1,698 words) - 17:37, 8 June 2025
up attacks against symmetric ciphers, doubling the key size can effectively counteract these attacks. Thus post-quantum symmetric cryptography does not...
63 KB (6,418 words) - 03:08, 19 June 2025
IPsec (redirect from Internet Protocol Security)
authentication of the Simple Network Management Protocol (SNMP) version 2. Authentication Header (AH) is a member of the IPsec protocol suite. AH ensures...
44 KB (5,337 words) - 03:03, 15 May 2025
specification is defined in several layers: (i) a type system, (ii) a symmetric, asynchronous protocol for the transfer of messages from one process to another, (iii)...
24 KB (2,669 words) - 04:06, 15 February 2025
Virtual private network (section Protocols)
Curve25519 protocol for key exchange and ChaCha20-Poly1305 for encryption and message authentication, but also includes the ability to pre-share a symmetric key...
32 KB (3,542 words) - 08:07, 13 June 2025
SDSL—Symmetric DSL SE—Single Ended SEI—Software Engineering Institute SEO—Search Engine Optimization SFTP—Secure FTP SFTP—Simple File Transfer Protocol SFTP—SSH...
92 KB (6,595 words) - 12:30, 13 June 2025
Bluetooth (redirect from Bluetooth Wireless Protocol)
when necessary. The adopted protocols include: Point-to-Point Protocol (PPP) Internet standard protocol for transporting IP datagrams over a point-to-point...
136 KB (14,080 words) - 02:35, 18 June 2025
Authenticator (section Symmetric key)
authenticator. See the #Examples section for details. A symmetric key is a shared secret used to perform symmetric-key cryptography. The claimant stores their copy...
30 KB (3,661 words) - 07:54, 24 May 2025
cryptographic systems are symmetric-key and public-key (also known as asymmetric-key). Many complex cryptographic algorithms often use simple modular arithmetic...
34 KB (3,645 words) - 07:39, 2 June 2025
networks, transport reliability under the end-to-end principle is the responsibility of the transport protocols, such as the Transmission Control Protocol (TCP)...
10 KB (1,351 words) - 22:49, 3 September 2024
IEEE 802.1aq (category Link protocols)
IEEE 802.1ad and transported only to other members of VLAN. Unicast, multicast, and broadcast are supported and all routing is on symmetric shortest paths...
91 KB (11,316 words) - 13:41, 24 May 2025
Public key infrastructure (category Transport Layer Security)
Management Protocol (CMP) Certificate Management over CMS (CMC) Simple Certificate Enrollment Protocol (SCEP) Enrollment over Secure Transport (EST) Automatic...
35 KB (4,124 words) - 20:07, 8 June 2025
Forward secrecy (category Transport Layer Security)
Forward secrecy protects data on the transport layer of a network that uses common transport layer security protocols, including OpenSSL, when its long-term...
26 KB (3,047 words) - 02:37, 21 May 2025
Protocol • Signal Intelligence Service • Signcryption • SIGSALY • SILC (protocol) • Silvio Micali • Simple Authentication and Security Layer • Simple...
67 KB (2,932 words) - 23:20, 16 May 2025
GNUnet (section Protocol translation)
encrypted with a symmetric key derived from H ( B ) {\displaystyle H(B)} when they are stored in the network. GNUnet Anonymity Protocol consists of queries...
20 KB (2,141 words) - 18:57, 2 April 2025
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...
28 KB (3,404 words) - 16:06, 8 December 2024