Given any system characterized by a number of devices and/or users communicating with specific communication protocols, the (related) security architecture refers to the enhancing security solution based on cryptographic techniques, protocols, and secure storage, as well as protection of keys and messages.
Examples of security architectures based on Public key techniques include X.509 and EMV. As part of the security architecture, a number of Trusted Third Parties may be defined, such as Registration Authorities, Certification Authorities, and Time Stamping Authorities. These are entities that are not part of the original system as such, but are introduced as part of the security architecture.
Other examples are Kerberos, based on conventional cryptography and bespoke key management architectures e.g. to handle online PIN-code (see Personal Identification Number) verification, which is characterized by key hierarchies, starting with session keys, or data keys at the bottom, which are...
This is a preview of subscription content, log in via an institution.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Landrock, P. (2005). Security Architecture. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_377
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_377
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering