Home | | Cryptography and Network Security | Key Management and Distribution

Chapter: Cryptography and Network Security Principles and Practice : Mutual Trust : Key Management and Distribution

Key Management and Distribution

Key distribution is the function that delivers a key to two parties who wish to exchange secure encrypted data. Some sort of mechanism or protocol is needed to provide for the secure distribution of keys.

PART 4: MUTUAL TRUST

Chapter 14 KEY MANAGEMENT AND DISTRIBUTION

 

o Symmetric Key Distribution Using Symmetric Encryption

·        A Key Distribution Scenario ierarchical Key Control Session Key Lifetime

·        A Transparent Key Control Scheme Decentralized Key Control Controlling Key Usage

o Symmetric Key Distribution Using Asymmetric Encryption

·        Simple Secret Key Distribution

·        Secret Key Distribution with Confidentiality and Authentication A Hybrid Scheme

o Distribution Of Public Keys

·        Public Announcement of Public Keys Publicly Available Directory

·        Public-Key Authority Public-Key Certificates

o X.509 Certificates

·        Certificates

·        X.509 Version 3

o Public-Key Infrastructure

·        PKIX Management Functions PKIX Management Protocols

 

 

KEY POINTS

      Key distribution is the function that delivers a key to two parties who wish to exchange secure encrypted data. Some sort of mechanism or protocol is needed to provide for the secure distribution of keys.

      Key distribution often involves the use of master keys, which are infre- quently used and are long lasting, and session keys, which are generated and distributed for temporary use between two parties.

      Public-key encryption schemes are secure only if the authenticity of the public key is assured. A public-key certificate scheme provides the neces- sary security.

      X.509 defines the format for public-key certificates. This format is widely used in a variety of applications.

      A public-key infrastructure (PKI) is defined as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.

      Typically, PKI implementations make use of X.509 certificates.

 

 

 

The topics of cryptographic key management and cryptographic key distribution are complex, involving cryptographic, protocol, and management considerations. The pur- pose of this chapter is to give the reader a feel for the issues involved and a broad sur- vey of the various aspects of key management and distribution. For more information, the place to start is the three-volume NIST SP 800-57, followed by the recommended readings listed at the end of this chapter.


Study Material, Lecturing Notes, Assignment, Reference, Wiki description explanation, brief detail
Cryptography and Network Security Principles and Practice : Mutual Trust : Key Management and Distribution : Key Management and Distribution |


Privacy Policy, Terms and Conditions, DMCA Policy and Compliant

Copyright © 2018-2024 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.