SKEME protocol

GPTKB entity

Statements (58)
Predicate Object
gptkbp:instance_of gptkb:crypt
gptkbp:based_on gptkb:Diffie-Hellman_key_exchange
gptkbp:designed_for key exchange
gptkbp:developed_by gptkb:Nicolas_T._Courtois
gptkbp:first_introduced gptkb:1997
gptkbp:has_variants gptkb:SKEME-A
gptkb:SKEME-B
gptkb:SKEME-C
https://www.w3.org/2000/01/rdf-schema#label SKEME protocol
gptkbp:is_adopted_by gptkb:financial_institutions
government agencies
industry standards
telecommunications companies
gptkbp:is_compatible_with various encryption algorithms
gptkbp:is_considered_as a scalable solution
a foundational protocol
a flexible protocol
a robust solution
a secure protocol
gptkbp:is_documented_in gptkb:RFCs
academic papers
gptkbp:is_evaluated_by gptkb:performance
scalability
cryptographers
security analysts
usability
gptkbp:is_implemented_in gptkb:software
gptkb:computer
gptkbp:is_part_of cryptographic standards
secure data transmission
secure application development
public key infrastructure
network security protocols
cryptographic research
secure network architecture
gptkbp:is_related_to gptkb:PGP
gptkb:IPsec
gptkb:SSL/_TLS
gptkbp:is_supported_by various programming languages
cryptographic libraries
gptkbp:is_tested_for attacks
known vulnerabilities
gptkbp:is_used_by VPNs
secure email services
gptkbp:is_used_in secure communications
secure messaging
secure file transfer
gptkbp:is_vulnerable_to man-in-the-middle attacks
gptkbp:provides confidentiality
authentication
integrity
gptkbp:requires secure key storage
gptkbp:suitable_for low-power devices
gptkbp:supports multiple key exchange methods
gptkbp:uses asymmetric key cryptography
symmetric key cryptography
gptkbp:bfsParent gptkb:IKE_(Internet_Key_Exchange)
gptkbp:bfsLayer 6