Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:based_on |
gptkb:Diffie-Hellman_key_exchange
|
gptkbp:designed_for |
key exchange
|
gptkbp:developed_by |
gptkb:Nicolas_T._Courtois
|
gptkbp:first_introduced |
gptkb:1997
|
gptkbp:has_variants |
gptkb:SKEME-A
gptkb:SKEME-B gptkb:SKEME-C |
https://www.w3.org/2000/01/rdf-schema#label |
SKEME protocol
|
gptkbp:is_adopted_by |
gptkb:financial_institutions
government agencies industry standards telecommunications companies |
gptkbp:is_compatible_with |
various encryption algorithms
|
gptkbp:is_considered_as |
a scalable solution
a foundational protocol a flexible protocol a robust solution a secure protocol |
gptkbp:is_documented_in |
gptkb:RFCs
academic papers |
gptkbp:is_evaluated_by |
gptkb:performance
scalability cryptographers security analysts usability |
gptkbp:is_implemented_in |
gptkb:software
gptkb:computer |
gptkbp:is_part_of |
cryptographic standards
secure data transmission secure application development public key infrastructure network security protocols cryptographic research secure network architecture |
gptkbp:is_related_to |
gptkb:PGP
gptkb:IPsec gptkb:SSL/_TLS |
gptkbp:is_supported_by |
various programming languages
cryptographic libraries |
gptkbp:is_tested_for |
attacks
known vulnerabilities |
gptkbp:is_used_by |
VPNs
secure email services |
gptkbp:is_used_in |
secure communications
secure messaging secure file transfer |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
|
gptkbp:provides |
confidentiality
authentication integrity |
gptkbp:requires |
secure key storage
|
gptkbp:suitable_for |
low-power devices
|
gptkbp:supports |
multiple key exchange methods
|
gptkbp:uses |
asymmetric key cryptography
symmetric key cryptography |
gptkbp:bfsParent |
gptkb:IKE_(Internet_Key_Exchange)
|
gptkbp:bfsLayer |
6
|