Click here to Skip to main content
14,022,546 members
Click here to Skip to main content
Add your own
alternative version

Tagged as


9 bookmarked
Posted 24 Aug 2018
Licenced CPOL

Basic Cryptographic Protocols: Key Exchange

, 25 Aug 2018
Introduction to protocols to manage Key Exchange in secure channels communication


Members may post updates or alternatives to this current article in order to show different approaches or add new features.

No alternatives have been posted.


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Author

Kewin Rausch
Software Developer
Italy Italy
I'm a Software Engineer with deep and extended knowledge in Computer Networks and low level environments as kernels and drivers. My competencies span from classic Wired IP networks to Wireless technologies like WiFi and 4G LTE. In the past I dealt with Next Generation Protocols, that requires to rethink internetworking from its core basis and requires to apply a clean slate approach on the current packet-based networks. In the lasts years my competencies grown towards the Computer Security world, from Cryptographic protocols to more practical strategies used to deal with the malware present in the wild.

My core competencies are C/C++ and Assembly programming languages, in both user- and kernel-space, together with an problem-solving oriented mindset and huge imagination to develop alternative approach to deal with them.

| | Privacy | Cookies | Terms of Use | Mobile
Web04 | 2.8.190417.4 | Last Updated 25 Aug 2018
Article Copyright 2018 by Kewin Rausch
Everything else Copyright © CodeProject, 1999-2019
Layout: fixed | fluid