blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
4.6.4.2.2 Asymmetric Key Management Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 4. Processing of Messages
Up: 4.6 Summary of Encapsulated Header Fields
Up: 4.6.4 Per-Recipient Encapsulated Header Fields
Up: 4.6.4.2 Key-Info Field
Prev: 4.6.4.2.1 Symmetric Key Management
Next: 5. Key Management

4.6.4.2.2 Asymmetric Key Management

4.6.4.2.2 Asymmetric Key Management

When asymmetric key management is employed for a given recipient, the "Key-Info:" field transfers two quantities, separated by a comma. The first argument is an IK Use Indicator identifying the algorithm and mode in which the DEK is asymmetrically encrypted. The second argument is a DEK, asymmetrically encrypted under the recipient's public component.

Appropriate asymmetric encryption algorithms and identifiers, and encrypted DEK formats are defined in RFC 1423.


Next: 5. Key Management

Connected: An Internet Encyclopedia
4.6.4.2.2 Asymmetric Key Management

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609