blank.gif (43 bytes)

Church Of The
Swimming Elephant

4.2 Asymmetric Encryption Algorithms Connected: An Internet Encyclopedia
4.2 Asymmetric Encryption Algorithms

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Up: 4. Asymmetric Key Management Algorithms
Prev: 4.1.1 RSA Keys
Next: 4.2.1 RSAEncryption

4.2 Asymmetric Encryption Algorithms

4.2 Asymmetric Encryption Algorithms

This section identifies the alternative algorithms that shall be used when asymmetric key management is employed, to encrypt DEKs and MICs. Character string identifiers are assigned for incorporation in "MIC- Info:" and "Key-Info:" header fields to indicate the choice of algorithm employed.

Only one alternative is presently defined in this category.

Next: 4.2.1 RSAEncryption

Connected: An Internet Encyclopedia
4.2 Asymmetric Encryption Algorithms


Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

Have you gone to church today?
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609