A new approach of secret key management lifecycle for military applications

  • Authors:
  • Nikolaos Bardis;Nikolaos Doukas;Konstantinos Ntaikos

  • Affiliations:
  • Hellenic Army Academy, Department of Computer Sciences, Vari and Hellenic Naval Academy, Piraeus and Hellenic Air Force Academy, Metamorfosi, Greece;Hellenic Army Academy, Department of Computer Sciences, Vari and Hellenic Naval Academy, Piraeus and Hellenic Air Force Academy, Metamorfosi, Greece;Hellenic Air Force Academy, Department of Computer Sciences, Metamorfosi, Greece

  • Venue:
  • WSEAS Transactions on Computers
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper a new approach is presented for key management access and sharing secret keys between certified users of a group. Such schemes are referred to as Symmetric Key Management Systems. The concept of information lifecycle management is first presented and analysed in the context of data storage efficiency. This concept is then extended for use with the management of symmetric secret keys. The need for a standard in symmetric secret key management is presented and founded on software engineering principles. A novel scheme contributing in this direction is hence presented. Specifically, access controls processes are presented that are based on passwords. These passwords, with the additional use of the AES cryptographic algorithm and nonces can be used to provide not only authentication for the access control in the system but additionally for the access in the encrypted file that stores all the symmetrical secret keys of each user of certified group. Following this, a new approach for the lifecycle management of secret keys is presented in order to achieve the secure communication based on encryption - decryption of all the messages in real time with the simultaneous use of two symmetrical secret keys for each transmission of information between the users. It is finally concluded that this innovative technology guarantees the automatic password and secret keys management lifecycle irrespective of the actions of the users and provides secure communication between certified group of users in local network and in internet.