Developing standard for authenticating network users. Kerberos offers two key benefits: it functions in a multivendor network, and it does not transmit passwords over the network.
Process that delivers a cryptographic key from the location where it is generated to the locations where it is used in a cryptographic algorithm.
key establishment (algorithm or protocol)
Process that combines the key generation and key distribution steps needed to set up or install a secure communication association.
Set of mathematically related keys—a public key and a private key—that are used for asymmetric cryptography and are generated in a way that makes it computationally infeasible to derive the private key from knowledge of the public key.
1. Process for learning the value of a cryptographic key that previously was used to perform some cryptographic operation.
2. Techniques that provide an intentional, alternate (that is, secondary) means to access the key used for data confidentiality service in an encrypted association.