Key Management. Furht, B., editor In Encyclopedia of Multimedia, pages 389–389. Springer US, 2008. 00000
Key Management [link]Paper  abstract   bibtex   
DefinitionKey management refers to an encryption algorithm and deals with the secure generation, distribution, storage, and disposal of keys.The security of an encryption algorithm often depends on the strength of the encryption algorithm and the key two factors. In practice, most attacks on public-key systems are targeted at the key management level instead of the cryptographic algorithm itself. When a key is compromised, the entire system maybe compromised. Hence it is extremely important to secure the keys. This is the task of key management.Key management deals with the secure generation, distribution, storage, and disposal of keys [1]. In other words, one must be able to get the key/s for the targeted application with the targeted security and efficiency requirement; the key/s must be stored securely so that no intruders can get it; legitimate users must be able to acquire the key/s for legitimate uses; and the lost or compromised keys are ready to be replaced and made a ...
@incollection{furht_key_2008-1,
	title = {Key {Management}},
	copyright = {©2008 Springer-Verlag},
	isbn = {978-0-387-74724-8 978-0-387-78414-4},
	url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_102},
	abstract = {DefinitionKey management refers to an encryption algorithm and deals with the secure generation, distribution, storage, and disposal of keys.The security of an encryption algorithm often depends on the strength of the encryption algorithm and the key two factors. In practice, most attacks on public-key systems are targeted at the key management level instead of the cryptographic algorithm itself. When a key is compromised, the entire system maybe compromised. Hence it is extremely important to secure the keys. This is the task of key management.Key management deals with the secure generation, distribution, storage, and disposal of keys [1]. In other words, one must be able to get the key/s for the targeted application with the targeted security and efficiency requirement; the key/s must be stored securely so that no intruders can get it; legitimate users must be able to acquire the key/s for legitimate uses; and the lost or compromised keys are ready to be replaced and made a ...},
	language = {en},
	urldate = {2016-05-03},
	booktitle = {Encyclopedia of {Multimedia}},
	publisher = {Springer US},
	editor = {Furht, Borko},
	year = {2008},
	note = {00000},
	pages = {389--389}
}
Downloads: 0