Skip to main content
Log in

Key Management — Fundamentals

PKI — The tip of the iceberg

  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Abstract

Public Key Infrastructures cryptographically represent the obvious key management strategy, though given the landscape of today’s personal security devices, symmetric key management is often a must. This paper explores the challenges of symmetric key management, its compromises relative to PKI, and mechanisms to mitigate these compromises.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Authors

Additional information

John Babbidge Director, Global Architecture, HID Global. He is responsible for the technical strategy and architectural integrity of HID Global’s products and solutions worldwide.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Babbidge, J. Key Management — Fundamentals. Datenschutz Datensich 37, 497–501 (2013). https://doi.org/10.1007/s11623-013-0206-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-013-0206-y

Navigation