Key Management

Key Management

Chuan-Kun Wu
ISBN13: 9781609607777|ISBN10: 1609607775|EISBN13: 9781609607784
DOI: 10.4018/978-1-60960-777-7.ch006
Cite Chapter Cite Chapter

MLA

Wu, Chuan-Kun. "Key Management." Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, IGI Global, 2011, pp. 88-113. https://doi.org/10.4018/978-1-60960-777-7.ch006

APA

Wu, C. (2011). Key Management. In D. Kar & M. Syed (Eds.), Network Security, Administration and Management: Advancing Technology and Practice (pp. 88-113). IGI Global. https://doi.org/10.4018/978-1-60960-777-7.ch006

Chicago

Wu, Chuan-Kun. "Key Management." In Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, 88-113. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7.ch006

Export Reference

Mendeley
Favorite

Abstract

In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit the ciphertext to Bob. However, in order to enable Bob to decrypt the ciphertext to get the original message, in traditional cipher system, Bob needs to have the encryption key. How to let Alice securely and efficiently transmit the encryption key to Bob is a problem of key management. An intuitive approach would be to use a secure channel for the key transmission; this worked in earlier years, but is not a desirable solution in today’s electronic world. Since the invention of public key cryptography, the key management problem with respect to secret key transmission has been solved, which can either employ the Diffie-Hellman key agreement scheme or to use a public key cryptographic algorithm to encrypt the encryption key (which is often known as a session key). This approach is secure against passive attacks, but is vulnerable against active attacks (more precisely the man-in-the-middle attacks). So there must be a way to authenticate the identity of the communication entities. This leads to public key management where the public key infrastructure (PKI) is a typical set of practical protocols, and there is also a set of international standards about PKI. With respect to private key management, it is to prevent keys to be lost or stolen. To prevent a key from being lost, one way is to use the secret sharing, and another is to use the key escrow technique. Both aspects have many research outcomes and practical solutions. With respect to keys being stolen, another practical solution is to use a password to encrypt the key. Hence, there are many password-based security protocols in different applications. This chapter presents a comprehensive description about how each aspect of the key management works. Topics on key management covered by this chapter include key agreement, group-based key agreement and key distribution, the PKI mechanisms, secret sharing, key escrow, password associated key management, and key management in PGP and UMTS systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.