In this section, we return to the original question about rekeying that sparked this whole venture, and answer three questions:
- What are the technical mechanisms in place for rekeying and effective use of encryption in the Internet standard security protocol IPsec?
- What was known, at the time these protocols were developed, about the best practices for rekeying?
- What are best practices today?
No comments:
Post a Comment