https://en.wikipedia.org/wiki/Cryptographic_protocol
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.[1]
Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects:
For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP/HTTPS) connections. It has an entity authentication mechanism, based on the X.509 system; a key setup phase, where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function. These three aspects have important interconnections. Standard TLS does not have non-repudiation support.
See Also
Links
https://en.wikipedia.org/wiki/Category:Cryptographic_protocols
Cryptographic protocols — the communication protocols designed and available to provide computer security assurances using cryptographic mechanisms.
For other cryptography tools and topics, see Category: Cryptography.
Subcategories
A
`Computer access control protocols (2 C, 43 P)
` Authentication protocols (7 P)
`B
` Broadcast encryption (1 P)
`K
`Key transport protocols (4 P)
` Key-agreement protocols (12 P)
`M
` Multicast encryption (1 P)
`S
` Secure Shell (1 C, 16 P)
`T
` Transport Layer Security (2 C, 56 P)
`Z
`Zero-knowledge protocols (5 P)
Pages
` Cryptographic protocol
`0–9
` 3-D Secure
`A
` Alice and Bob
Anshel–Anshel–Goldfeld key exchange
ANSI ASC X9.95 Standard
Anti-replay
AS1 (networking)
AS2
Authentication and Key Agreement (protocol)
AuthIP
Automated Certificate Management Environment
Autoroll
`B
` Bilateral key exchange
BitTorrent protocol encryption
`C
` CAVE-based authentication
CCMP (cryptography)
CECPQ1
Certificate Management over CMS
Certificate Management Protocol
Certification path validation algorithm
Code Access Security
Cryptographic Message Syntax
Cryptographically Generated Address
`D
` Datagram Transport Layer Security
Delegated Path Discovery
Delegated Path Validation
Deniable authentication
DH/DSS
Digest access authentication
DigiCipher 2
Digital credential
Distance-bounding protocol
Distributed System Security Architecture
DomainKeys
DomainKeys Identified Mail
`E
` Ecash
Encrypted key exchange
Enrollment over Secure Transport
`F
` Firefly (key exchange protocol)
`G
` Garbled circuit
Generic Bootstrapping Architecture
Generic Security Service Algorithm for Secret Key Transaction
Grid Security Infrastructure
Group Domain of Interpretation
`H
` H.235
Hashcash
High Assurance Internet Protocol Encryptor
Host Identity Protocol
HTTP/1.1 Upgrade header
HTTPS
HTTPsec
`I
` I2P
IEEE 802.11i-2004
Integrated Encryption Scheme
Internet Key Exchange
Internet Security Association and Key Management Protocol
IPsec
`K
` Kak's three stage protocol
Kerberized Internet Negotiation of Keys
Key exchange
Key Management Interoperability Protocol
`M
` Massey-omura cryptosystem
Massey-Omura cryptosystem
McTLS
Microsoft Point-to-Point Encryption
MIKEY
Multi-party fair exchange protocol
`N
` Neuman–Stubblebine protocol
`O
` Oak Orion
Oakley protocol
OCSP stapling
Off-the-Record Messaging
Offline private key protocol
OMEMO
Online Certificate Status Protocol
Openswan
`P
` Password Authenticated Key Exchange by Juggling
Piggy bank cryptography
Privacy-enhanced Electronic Mail
Private Communications Technology
Proof of secure erasure
Protocol for Carrying Authentication for Network Access
Publius (publishing system)
`S
` Salted Challenge Response Authentication Mechanism
SCVP
Secure Communications Interoperability Protocol
Secure copy
Secure Hypertext Transfer Protocol
Secure multi-party computation
Secure Neighbor Discovery
Secure Real-time Transport Protocol
Security Protocols Open Repository
Shamir three-pass protocol
Signal Protocol
Signature Record Type Definition
Silent Circle Instant Messaging Protocol
Simple Authentication and Security Layer
Simple Certificate Enrollment Protocol
SPNEGO
SSH File Transfer Protocol
`T
` TACLANE
Tcpcrypt
Temporal Key Integrity Protocol
Threshold shadow scheme
Time stamp protocol
Tor (anonymity network)
List of Tor hidden services
Transport Layer Security
`V
` Vouch by Reference
`W
` Wi-Fi Protected Access
Wi-Fi Protected Setup
Wired Equivalent Privacy
Wireless Transport Layer Security
WLAN Authentication and Privacy Infrastructure
`X
` X.509
X.1035
XKMS
`Y
` Yahalom (protocol)
YAK (cryptography)
`Z
` Zimmermann–Sassaman key-signing protocol
ZRTP
Pages in Other Languages
Categories
Categories:
Application layer protocols
Comments (0)
You don't have permission to comment on this page.