IPsec/Related Articles: Difference between revisions
< IPsec
Jump to navigation
Jump to search
imported>Daniel Mietchen |
No edit summary |
||
Line 24: | Line 24: | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
{{r|Secure Shell}} | {{r|Secure Shell}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Internet}} | |||
{{r|Opportunistic encryption}} | |||
{{r|Cryptography}} | |||
{{r|Diffie-Hellman}} | |||
{{r|Cryptographic key}} |
Latest revision as of 16:01, 30 August 2024
- See also changes related to IPsec, or pages that link to IPsec or to this page or whose text contains "IPsec".
Parent topics
Subtopics
- Internet Key Exchange [r]: Add brief definition or description
- Encapsulated Security Payload [r]: Add brief definition or description
- Authentication Header [r]: Add brief definition or description
- IPv6 [r]: Add brief definition or description
- FreeSWAN [r]: A Linux implementation of the IPsec protocols, intended to make wholesale monitoring of the Internet impossible. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Secure Shell [r]: Network protocol for secure remote login, providing an encrypted connection instead of the unencrypted, and therefore insecure, connection of telnet. [e]
- Internet [r]: International "network of networks" that connects computers together through the Internet Protocol Suite and supports applications like Email and the World Wide Web. [e]
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]