The SSL protocol supports the use of a variety of different cryptographic algorithms, or ciphers, for use in operations such as authenticating the server and client to each other, transmitting certificates, and establishing session keys. Clients and servers may support different cipher suites, or sets of ciphers, depending on factors such as the version of SSL they support, company policies regarding acceptable encryption strength, and government restrictions on export of SSL-enabled software. Among its other functions, the SSL handshake protocol determines how the server and client negotiate which cipher suites they will use to authenticate each other, to transmit certificates, and to establish session keys.
The cipher suite descriptions that follow refer to these algorithms:
DES. Data Encryption Standard, an encryption algorithm used by the U.S. Government.
DSA. Digital Signature Algorithm, part of the digital authentication standard used by the U.S. Government.
KEA. Key Exchange Algorithm, an algorithm used for key exchange by the U.S. Government.
MD5. Message Digest algorithm developed by Rivest.
RC2 and RC4. Rivest encryption ciphers developed for RSA Data Security.
RSA. A public-key algorithm for both encryption and authentication. Developed by Rivest, Shamir, and Adleman.
RSA key exchange. A key-exchange algorithm for SSL based on the RSA algorithm.
SHA-1. Secure Hash Algorithm, a hash function used by the U.S. Government.
SKIPJACK. A classified symmetric-key algorithm implemented in FORTEZZA-compliant hardware used by the U.S. Government. (For more information, see FORTEZZA Cipher Suites.)
Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.