Skip to main content

Key Management Techniques

  • Chapter
  • First Online:
State of the Art in Applied Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

  • 853 Accesses

Abstract

Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use. This article describes such techniques, and especially a variety of key establishment mechanisms. In addition, relevant standardization activities are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R. J.; Roe, M.: „The GCHQ protocol and its problems“, Proceedings of Eurocrypt’97, Springer LNCS 1233 (1997), 134–148.

    Google Scholar 

  2. ANSI X9.17-1985: Financial Institution Key Management (Wholesale), 1985.

    Google Scholar 

  3. ANSI X9.24-1992: Financial Services Retail Key Management, 1992.

    Google Scholar 

  4. ANSI Working Draft X9.42: Public Key Cryptography for the Financial Services Industry-Managing of Symmetric Algorithm Keys Using Diffie Hellman, 1996.

    Google Scholar 

  5. ANSI Working Draft X9.57: Public Key Cryptography for the Financial Services Industry-Certificate Management, 1995.

    Google Scholar 

  6. Denning, D. E.; Branstad, D. K.: „A taxonomy for key escrow encryption systems“, Communications of the ACM, 39(3) (1996), 33–40.

    Article  Google Scholar 

  7. Diffie, W.; Hellman, M. E.: „New Directions in Cryptography“, IEEE Transactions on Information Theory, 22 (1976), 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  8. Freier, A. O.; Karlton, P.; Kocher, P. C.; Dierks, T.: „The TLS Protocol, Version 1.0“, Internet-Draft, November 1996.

    Google Scholar 

  9. Fumy, W. „Internet Security Protocols“, this volume, pp. 188–211.

    Google Scholar 

  10. Hughes, J.: „Combined DES-CBC, HMAC and Replay Prevention Security Transform“, Internet-Draft, September 1996.

    Google Scholar 

  11. 1363] IEEE P1363: Standard for Public Key Cryptography, Draft March 1997.

    Google Scholar 

  12. 11666-1] ISO/TEC 11666-1: Banking-Key Management by Means of Asymmetric Algorithms-Part 1: Principles, Procedures and Formats, 1994.

    Google Scholar 

  13. 11666-2] ISO/IEC 11666-2: Banking-Key Management by Means of Asymmetric Algorithms-Part 2: Approved Algorithms Using the RSA Cryptosystem, 1995.

    Google Scholar 

  14. ISO/IEC 11568-1: Banking-Key Management (Retail)-Part 1: Introduction to Key Management, 1994.

    Google Scholar 

  15. 11568-2] ISO/IEC 11568-2: Banking-Key Management (Retail)-Part 2: Key Management Techniques for Symmetric Ciphers, 1994.

    Google Scholar 

  16. ISO/IEC 11568-3: Banking-Key Management (Retail)-Part 3: Key Life Cycle for Symmetric Ciphers, 1994.

    Google Scholar 

  17. 11568-4] ISO/IEC Draft International Standard 11568-4: Banking-Key Management (Retail)-Part 4: Key Management Techniques Using Public Key Cryptography, 1996.

    Google Scholar 

  18. ISO/IEC 11770-1: Key Management Part 1: Key Management Framework, 1997.

    Google Scholar 

  19. 11770-2] ISO/IEC 11770-2: Key Management Part 2: Mechanisms Using Symmetric Techniques, 1996.

    Google Scholar 

  20. ISO/IEC Draft International Standard 11770-3: Key Management Part 3: Mechanisms Using Symmetric Techniques, 1996.

    Google Scholar 

  21. ISO/IEC 9798-4: Entity Authentication-Part 4: Mechanisms using cryptographic check functions, 1995.

    Google Scholar 

  22. Jefferies, N.; Mitchell, C; Walker, M.: „A proposed architecture for trusted third party services“, in: Cryptography: Policy and Algorithms. Springer LNCS 1029 (1996), 98–104.

    Chapter  Google Scholar 

  23. Maughan, D.; Schertler, M.; Schneider, M.; Turner, J.: „Internet Security Association and Key Management Protocol (ISAKMP)“, Internet-Draft, February 1997.

    Google Scholar 

  24. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A.: Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.

    Google Scholar 

  25. Needham, R.M.; Schroeder, M.D.: „Using Encryption for Authentication in Large Networks of Computers“, Communications of the ACM, 21 (1978), 993–999.

    Article  MATH  Google Scholar 

  26. Orman, H.K.: „The Oakley Key Determination Protocol“, Internet-Draft, May 1996.

    Google Scholar 

  27. Rivest, R.L.; Shamir, A.; Adleman, L.: „A Method for Obtaining Digital Signatures and Public-Key Cryptosystems“, Communications of the ACM 21 (1978), 120–126.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Fumy, W. (1998). Key Management Techniques. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics