Cryptographic protocol
Cryptographic Protocol - a protocol that uses a cryptographic algorithm to ensure an adequate level of confidentiality and credibility between communicating parties. Describes how to use the algorithm and ensures that it is impossible to know more than what is given in the protocol.
Describes the proper way to use cryptographic techniques to ensure their safe use. Typically, cryptographic protocols deal with the manner in which information is exchanged using encryption, in such a way as to prevent the disclosure of sensitive information or any other information - such as keys or, for example, information about the identity of the communicating person during the full information exchange process. Usually, a single protocol uses a number of cryptographic techniques, such as an asymmetric cipher, to securely exchange keys used for encrypting messages with symmetric ciphers, etc.
The construction of cryptographic protocols is a complex and often cryptic and ingenious process. Improper construction, implementation, or use of the cryptographic protocol generally leads to the ability to read encrypted messages or, for example, impersonate someone involved in the information exchange process, regardless of the use of formally secure encryption algorithms.
An example of this may be a one time pad, as part of the Venona project, described on the USSA website. Incorrect use of the one time pad encryption protocol (multiple uses of the same passwords) has resulted from consistent analysis and extension techniques for reading the list of agents of the Russian spy network. Hence, the time pad is considered to be the most secure encryption algorithm, but the cryptographic protocol associated with this encryption technique is a problematic component of this encryption method, which makes it less error-tolerant and more complex to use. Examples of cryptographic protocols
wiki
Comments
Post a Comment