Professional Documents
Culture Documents
What
is key management?
Why are we talking about key
management?
Key management techniques
Key management life cycle
Key
Objectives
The objective of key management is to maintain
keying relationships and keying material in a
manner that counters relevant threats
In practice an additional objective is conformance to
a relevant security policy
Threats
1. compromise of confidentiality of secret keys
2. compromise of authenticity of secret or public keys.
3. unauthorized use of public or secret keys
Security policy
Security policy explicitly or implicitly defines the
threats a system is intended to address
Security policy may affect the stringency of
cryptographic requirements, depending on the
susceptibility of the environment in questions to
various types of attack.
a)
Key management
Symmetric-key encryption
plaintext
ciphertext
encryption
secret key
symmetric
key generator
decryption
plaintext
secret key
plaintext
ciphertext
encryption
decryption
public key
private key
asymmetric key pair
generation