Key Management

                                       Key Management





  • An encryption key management system includes generation, exchange, storage, use, destruction and replacement of encryption keys. 

  • The problems with the public-keys encryption algorithm is that if that if some user could pretend to be one user and send a public key to another participant or broadcast such a public key. 

  • In conventional encryption, the two parties have to share secret key. 

  • Encryption public keys used for key transportation or storage of other keys. 

  • Keys can be generated through a key management system, hardware security module or by a trusted third party, which should use a cryptographically secure true random number generator for seeds. 

  • Each key should have a key strength (generally measured in number of bits) associated with it that can provide adequate protection for the entire useful lifetime of the protected data along with the ability to withstand attacks during this lifetime. 

  • The key management system should be able to handle all of the transitions between phases of a life-cycle and should be capable of monitoring an keeping track of the workflows. 

  • It is observed that cryptographic schemes are rarely compromised through weaknesses in their design.


KEYWORD:

CA            -            Certificate Authority

HSM        -             Hardware Security Module

TTP          -             Trusted Third Party

PKI          -              Public-Key Party

TRNG      -              True Random Number Generator

Comments