Go to GoReading for breaking news, videos, and the latest top stories in world news, business, politics, health and pop culture.

Encrypted Protocol

104 10

    Function

    • Encrypted (or encryption) protocols define a method of altering data to render it incomprehensible to any eavesdropper. The intended recipient of the data must be able to convert the received data back into meaningful information. This process requires a common set of procedures and a formula to transform data into an encrypted message and to convert it back again.

    Features

    • Networked applications often involve two computers that have had no previous contact. It is not possible for each to already know the "key" for the encrypted protocol. A "key" is a variable used in the encryption process. Without this key, it will be impossible to decipher the message even if the encryption formula is known. Key distribution is a major factor of encrypted protocols.

    Example

    • The most widely used encrypted protocol is the Transport Layer Security (TLS) protocol. This is the security system behind the HTTPS (Hypertext Transfer Protocol Secure). TLS includes a method of key distribution, through validation certificates, as well as encryption methods.

Source...

Leave A Reply

Your email address will not be published.