Справочник ПользователяСодержаниеIntroduction1Why Are Security Measures Necessary?1Clear Text Transmissions1Passive Monitoring2End-to-End Security2Security Features of the Canopy System2Canopy’s Proprietary Protocol3Authentication3Key Management4Encryption5Data Encryption Standard (DES)5Advanced Encryption Standard (AES)6Summary8Table 1. The Authentication Process4Table 2. Canopy Key Management4Table 3. Methods of Encryption and Their Associated Keys7Размер: 231,9 КБСтраницы: 13Язык: EnglishПросмотреть