security protocol
security protocol
A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem (see below). For example, the 802.11i standard provides these functions for wireless LANs.
On the Web, TLS and SSL are widely used to provide authentication and encryption in order to send credit card numbers and other private data to a vendor. Following are the primary components of a security protocol. See cryptography, information security, PCT and IPsec.
Access Control
Authenticates user identity. Authorizes access to specific resources based on permissions level and policies. See access control and authentication.
Encryption Algorithm
The cryptographic cipher combined with various methods for encrypting the text. See encryption algorithm, HTTPS and TLS.
Key Management
Create, distribute and maintain the keys. See key management.
Message Integrity
Ensures that the encrypted message has not been tampered with. See message integrity.Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Copyright © 2003-2025 Farlex, Inc
Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.