PPT Slide
- Developed by IETF (RFC 1421 - 1424)
- Provides
- Confidentiality
- Authentication
- Message integrity assurance
- Nonrepudiation of origin
- Data encryption key (DEK) could be secret or public key-based originator and receiver agreed upon method
- PEM processes based on cryptography and message encoding
- MIC-CLEAR (Message Integrity Code-CLEAR)
- MIC-ONLY
- ENCRYPTED
Network Management: Principles and Practice