Talk:Opportunistic encryption: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: {{subpages}})
 
imported>Howard C. Berkowitz
Line 1: Line 1:
{{subpages}}
{{subpages}}
== I do hate to bring up layering. Really. ==
Are the potential encryption modes learned in the source authentication process?  Let's say, for example, two hosts are both capable of doing IPSec transport mode and SSL. How do they decide what to use if there are multiple options?  If, in a given crypto protocol, there are different key lengths, timers, etc. -- do they negotiate?
[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 19:28, 30 August 2010 (UTC)

Revision as of 14:28, 30 August 2010

This article is developed but not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [d] [e]
Checklist and Archives
 Workgroup category computers [Editors asked to check categories]
 Subgroup category:  Security
 Talk Archive none  English language variant Canadian English

I do hate to bring up layering. Really.

Are the potential encryption modes learned in the source authentication process? Let's say, for example, two hosts are both capable of doing IPSec transport mode and SSL. How do they decide what to use if there are multiple options? If, in a given crypto protocol, there are different key lengths, timers, etc. -- do they negotiate?

Howard C. Berkowitz 19:28, 30 August 2010 (UTC)