Synonyms
Related Concepts
Definition
Key management involves all the operations related to cryptographic keys, including key generation, distribution, storage, update, and cancellation.
Background
Cryptographic keys are used to encrypt/decrypt data or to create/verify digital signatures (Key). One of the biggest issues associated with cryptography is the secure distribution of these keys to the appropriate communicating parties. This is referred to as key distribution or key establishment. The life cycle associated with this keying material (i.e., the initialization, distribution, and cancellation of the keys) is referred to as key management. This article discusses key management, with particular emphasis on key distribution.
Theory
In order to understand key management, it is important to recall that there are two basic types of cryptography: (1) symmetric or secret key and (2) asymmetric or public key.
Symm...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Adams C, Farrell S (1999) Internet X.509 public key infrastructure: certificate management protocols. Internet request for comments 2510
Adams C, Lloyd S (2003) Understanding PKI: concepts, standards, and deployment considerations, 2nd edn. Addison-Wesley, Reading, ISBN 0-672-32391-5
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654
ITU-T (2000) ITU-T Recommendation X.509: information technology – open systems interconnection – the directory: public key and attribute certificate frameworks (equivalent to ISO/IEC 9594-8:2001)
Kohl J, Neuman C (1993) The Kerberos network authentication service (V5) Internet request for comments 1510
Needham R, Schroeder M (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999
Ramsdell B (1999) S/MIME version 3 certificate handling. Internet request for comments 2632
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Lloyd, S., Adams, C. (2011). Key Management. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_85
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_85
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering