security protocol


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms.

security protocol

A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem (see below). For example, the 802.11i standard provides these functions for wireless LANs.

For the Web, SSL and TLS are widely used to provide authentication and encryption in order to send sensitive data such as credit card numbers to a vendor. Following are the primary components of a security protocol. See cryptography, information security, HTTPS, SSL, TLS, PCT and IPsec.

Access Control
Authenticates user identity. Authorizes access to specific resources based on permissions level and policies. See access control and authentication.

Encryption Algorithm
The cryptographic cipher combined with various methods for encrypting the text. See encryption algorithm.

Key Management
Create, distribute and maintain the keys. See key management.

Message Integrity
Ensures that the encrypted message has not been tampered with. See message integrity.
References in periodicals archive ?
SoC designers rely on security protocol accelerators to increase performance and reduce latency of cryptographic algorithms in SoCs," said John Koeter, vice president of marketing for IP at Synopsys.
Rahul Gandhi's security protocol is high-level and we don't want to leave any loop holes.
I was going to offer Friday prayers with my children when security protocol of Maryam Nawaz stopped us.
The seminars will focus on coaching and training employees on the updated and amended guidelines and regulations, user training of the security protocols, and changes to data access and records pull up.
Recently announced are three new security protocol processors (the BCM5860, BCM5861 and BCM5862) that include either PCI-X(R) or PCI Express(R) host bus architectures.
Ambassador to Israel Martin Indyk, for breaches of security protocols, accusing him of spying for Israel.
The baby's father, Faisal, a resident of Lyari area has alleged that he was unable to bring the child to the hospital in time due to strict security protocol around the hospital.
A two-judge LHC bench headed by Justice Mian Saqib Nisar suspended the verdict of LHC single bench, lifting the security protocol, after hearing an intra-court appeal on a petition moved by the federal government.
ISLAMABAD, September 28, 2010 (Balochistan Times): The Lahore High Court on Tuesday ordered to restore the security protocol of nuclear scientist Dr Abdul Qadeer Khan.
ISLAMABAD, September 28, 2010 (Frontier Star): The Lahore High Court on Tuesday ordered to restore the security protocol of nuclear scientist Dr Abdul Qadeer Khan.

Full browser ?