| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Cryptographic Protocols

Page history last edited by Dmitry Sokolov 6 years, 3 months ago

Go:

 Visual Taxonomy Links   Hide/Show:

Taxonomy Path

https://en.wikipedia.org/wiki/Cryptographic_protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.[1]

Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects:

For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP/HTTPS) connections. It has an entity authentication mechanism, based on the X.509 system; a key setup phase, where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function. These three aspects have important interconnections. Standard TLS does not have non-repudiation support.

See Also


Links  

https://en.wikipedia.org/wiki/Category:Cryptographic_protocols

Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.

For other cryptography tools and topics, see Category: Cryptography.

Subcategories

A

`Computer access control protocols (2 C, 43 P)

`    Authentication protocols (7 P)

`B

`    Broadcast encryption (1 P)

`K

`Key transport protocols (4 P)

`    Key-agreement protocols (12 P)

`M

`    Multicast encryption (1 P)

`S

`    Secure Shell (1 C, 16 P)

`T

`    Transport Layer Security (2 C, 56 P)

`Z

`Zero-knowledge protocols (5 P)

Pages

 

`    Cryptographic protocol

`0–9

`    3-D Secure

`A

`    Alice and Bob

    Anshel–Anshel–Goldfeld key exchange

    ANSI ASC X9.95 Standard

    Anti-replay

    AS1 (networking)

    AS2

    Authentication and Key Agreement (protocol)

    AuthIP

    Automated Certificate Management Environment

    Autoroll

`B

`    Bilateral key exchange

    BitTorrent protocol encryption

`C

`    CAVE-based authentication

    CCMP (cryptography)

    CECPQ1

    Certificate Management over CMS

    Certificate Management Protocol

    Certification path validation algorithm

    Code Access Security

    Cryptographic Message Syntax

    Cryptographically Generated Address

`D

`    Datagram Transport Layer Security

    Delegated Path Discovery

    Delegated Path Validation

    Deniable authentication

    DH/DSS

    Digest access authentication

    DigiCipher 2

    Digital credential

    Distance-bounding protocol

    Distributed System Security Architecture

    DomainKeys

    DomainKeys Identified Mail

`E

`    Ecash

    Encrypted key exchange

    Enrollment over Secure Transport

`F

`    Firefly (key exchange protocol)

`G

`    Garbled circuit

    Generic Bootstrapping Architecture

    Generic Security Service Algorithm for Secret Key Transaction

    Grid Security Infrastructure

    Group Domain of Interpretation

`H

`    H.235

    Hashcash

    High Assurance Internet Protocol Encryptor

    Host Identity Protocol

    HTTP/1.1 Upgrade header

    HTTPS

    HTTPsec

`I

`    I2P

    IEEE 802.11i-2004

    Integrated Encryption Scheme

    Internet Key Exchange

    Internet Security Association and Key Management Protocol

    IPsec

`K

`    Kak's three stage protocol

    Kerberized Internet Negotiation of Keys

    Key exchange

    Key Management Interoperability Protocol

`M

`    Massey-omura cryptosystem

    Massey-Omura cryptosystem

    McTLS

    Microsoft Point-to-Point Encryption

    MIKEY

    Multi-party fair exchange protocol

`N

`    Neuman–Stubblebine protocol

`O

`    Oak Orion

    Oakley protocol

    OCSP stapling

    Off-the-Record Messaging

    Offline private key protocol

    OMEMO

    Online Certificate Status Protocol

    Openswan

`P

`    Password Authenticated Key Exchange by Juggling

    Piggy bank cryptography

    Privacy-enhanced Electronic Mail

    Private Communications Technology

    Proof of secure erasure

    Protocol for Carrying Authentication for Network Access

    Publius (publishing system)

`S

`    Salted Challenge Response Authentication Mechanism

    SCVP

    Secure Communications Interoperability Protocol

    Secure copy

    Secure Hypertext Transfer Protocol

    Secure multi-party computation

    Secure Neighbor Discovery

    Secure Real-time Transport Protocol

    Security Protocols Open Repository

    Shamir three-pass protocol

    Signal Protocol

    Signature Record Type Definition

    Silent Circle Instant Messaging Protocol

    Simple Authentication and Security Layer

    Simple Certificate Enrollment Protocol

    SPNEGO

    SSH File Transfer Protocol

`T

`    TACLANE

    Tcpcrypt

    Temporal Key Integrity Protocol

    Threshold shadow scheme

    Time stamp protocol

    Tor (anonymity network)

    List of Tor hidden services

    Transport Layer Security

`V

`    Vouch by Reference

`W

`    Wi-Fi Protected Access

    Wi-Fi Protected Setup

    Wired Equivalent Privacy

    Wireless Transport Layer Security

    WLAN Authentication and Privacy Infrastructure

`X

`    X.509

    X.1035

    XKMS

`Y

`    Yahalom (protocol)

    YAK (cryptography)

`Z

`    Zimmermann–Sassaman key-signing protocol

    ZRTP

Pages in Other Languages

 

Categories

Categories:

Application layer protocols

     

     

    Comments (0)

    You don't have permission to comment on this page.