Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos.
Love Hörnquist-ÅstrandTom YuPublished in: RFC (2012)
Keyphrases
- cryptographic algorithms
- security protocols
- data encryption standard
- authentication protocol
- elliptic curve cryptography
- security mechanisms
- security analysis
- biometric data
- secret key
- security systems
- key distribution
- image encryption
- information systems
- feature extraction
- user authentication
- authentication scheme