Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Key cryptographic protocols are essential for secure communication in our digital world. They enable safe key exchanges, data integrity, and authentication, ensuring that sensitive information remains protected from unauthorized access while allowing trusted interactions between users and systems.
Diffie-Hellman Key Exchange
RSA (Rivest-Shamir-Adleman)
Digital Signature Algorithm (DSA)
Elliptic Curve Cryptography (ECC)
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
IPsec (Internet Protocol Security)
PGP (Pretty Good Privacy)
Kerberos
SSH (Secure Shell)
Zero-Knowledge Proofs