Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/Cookie_exchange> ?p ?o }
Showing triples 1 to 29 of
29
with 100 triples per page.
- Cookie_exchange abstract "The cookie exchange in IPsec comes under the Oakley protocol, which is a protocol of key management. The cookie exchange requires that each side send a pseudorandom number, the cookie, in the initial message, which the other side acknowledges. This acknowledgement must be repeated in the first message of the Diffie-Hellman key exchange. If the source address was forged, the opponent gets no answer. Thus, an opponent can only force a user to generate acknowledgements and not to perform the Diffie-Hellman calculation. Note that \"cookies\" in the sense of IPsec are unrelated to HTTP cookies used by web browsers.The recommended method for creating the cookie is to perform a fast hash (e.g. MD5) over the IP source and destination addresses, the UDP source and destination ports, and a locally generated secret value.".
- Cookie_exchange wikiPageID "3441938".
- Cookie_exchange wikiPageLength "1142".
- Cookie_exchange wikiPageOutDegree "9".
- Cookie_exchange wikiPageRevisionID "638339016".
- Cookie_exchange wikiPageWikiLink Category:Internet_protocols.
- Cookie_exchange wikiPageWikiLink Diffie–Hellman_key_exchange.
- Cookie_exchange wikiPageWikiLink HTTP_cookie.
- Cookie_exchange wikiPageWikiLink Hash_function.
- Cookie_exchange wikiPageWikiLink IPsec.
- Cookie_exchange wikiPageWikiLink Internet_Protocol.
- Cookie_exchange wikiPageWikiLink MD5.
- Cookie_exchange wikiPageWikiLink Oakley_protocol.
- Cookie_exchange wikiPageWikiLink Pseudorandomness.
- Cookie_exchange wikiPageWikiLinkText "Cookie exchange".
- Cookie_exchange wikiPageUsesTemplate Template:About.
- Cookie_exchange wikiPageUsesTemplate Template:Unreferenced.
- Cookie_exchange subject Category:Internet_protocols.
- Cookie_exchange hypernym Protocol.
- Cookie_exchange type Software.
- Cookie_exchange type Protocol.
- Cookie_exchange type Redirect.
- Cookie_exchange comment "The cookie exchange in IPsec comes under the Oakley protocol, which is a protocol of key management. The cookie exchange requires that each side send a pseudorandom number, the cookie, in the initial message, which the other side acknowledges. This acknowledgement must be repeated in the first message of the Diffie-Hellman key exchange. If the source address was forged, the opponent gets no answer.".
- Cookie_exchange label "Cookie exchange".
- Cookie_exchange sameAs Q5167098.
- Cookie_exchange sameAs m.09cmcs.
- Cookie_exchange sameAs Q5167098.
- Cookie_exchange wasDerivedFrom Cookie_exchange?oldid=638339016.
- Cookie_exchange isPrimaryTopicOf Cookie_exchange.