security protocol

(redirected from Cryptographic protocol)
Also found in: Wikipedia.

security protocol

A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem (see below). For example, the 802.11i standard provides these functions for wireless LANs.

On the Web, TLS and SSL are widely used to provide authentication and encryption in order to send credit card numbers and other private data to a vendor. Following are the primary components of a security protocol. See cryptography, information security, PCT and IPsec.

Access Control
Authenticates user identity. Authorizes access to specific resources based on permissions level and policies. See access control and authentication.

Encryption Algorithm
The cryptographic cipher combined with various methods for encrypting the text. See encryption algorithm, HTTPS and TLS.

Key Management
Create, distribute and maintain the keys. See key management.

Message Integrity
Ensures that the encrypted message has not been tampered with. See message integrity.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
2) Achieving verification via one-way hash function conforms to principles for secure cryptographic protocol design [21].
WikiLeaks said it verified its batch of emails using DomainKeys Identified Mail - or DKIM - signatures, a cryptographic protocol that acts like a digital shipping manifest and has become an increasingly popular way for researchers and tech-savvy journalists to prove that emails are authentic.
Each time I do a credit card transaction online, I am assuming that a certain cryptographic protocol will successfully hide my information well enough to prevent criminals from stealing my credit card number and going on a shopping spree.
today announced that, in collaboration with the University of Tokyo and Toho University, it has developed authentication technology for Internet-of-Things (IoT) devices that reduces the time needed for authentication in the Transport Layer Security (TLS)(1) cryptographic protocol by nearly 80%, compared to previous methods with the same security strength.
Computer scientists explain a cryptographic technology in which the parties provide their inputs to a cryptographic protocol that is used to compute a pre-agreed function in such a manner that during the protocol, a party or a sufficiently small coalition of parties sees nothing more that they could deduce from the party's or coalition's inputs and outputs.
Secure Sockets Layer (SSL) is a cryptographic protocol which is designed to provide communication security over the Internet.
Founded on Base Selection and Transmission Synchronization quantum cryptographic protocol [12] and Quantum Bit Travel Time eavesdropper detection method [10], we obtain a quantum transmission cryptographic protocol, named Base Selection and Polarization Agreement -BSPA [13].
Yahoo's delay in providinga Secure Sockets Layer (SSL) connectionfor email sessions has been criticised by privacy groups that argue the cryptographic protocol help prevent hackers from reading messages sent over a Wi-Fi network.
The Air Force has enlisted a group of researchers to create quantum memories based on the interaction between light and matter that would result in a new form of encryption that some experts have called "perfect." Quantum systems provide a level of security far exceeding that of any cryptographic protocol currently known, experts say.
This volume presents 22 papers drawn from those sessions, addressing such topics as minimal message complexity of asynchronous multi-party contract signing, tight enforcement of information-release policies for dynamic languages, securing timeout instructions in web applications, cryptographic protocol synthesis and verification for multiparty sessions, specification and analysis of dynamic authorization policies, policy compliance in collaborative systems, expressive power of definitive clauses for verifying authenticity, and universally composable symmetric encryption.

Full browser ?