Abstract
Public Key Infrastructures cryptographically represent the obvious key management strategy, though given the landscape of today’s personal security devices, symmetric key management is often a must. This paper explores the challenges of symmetric key management, its compromises relative to PKI, and mechanisms to mitigate these compromises.
Similar content being viewed by others
Literature
NIST Special Publication 800-57 Part 1 (http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf)
NIST Special Publication 800-57 Part 2 (http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part2.pdf)
NIST Special Publication 800-57 Part 3 (http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf)
NIST Suite B Cryptography (http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml)
OASIS Key Management Interoperability Protocol (https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=kmip)
PKCS #11: Cryptographic Token Interface Standard (http://www.rsa.com/rsalabs/node.asp?id=2133)
Additional information
John Babbidge Director, Global Architecture, HID Global. He is responsible for the technical strategy and architectural integrity of HID Global’s products and solutions worldwide.
Rights and permissions
About this article
Cite this article
Babbidge, J. Key Management — Fundamentals. Datenschutz Datensich 37, 497–501 (2013). https://doi.org/10.1007/s11623-013-0206-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-013-0206-y