Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Placement of cryptographic key distribution within OSI: design alternatives and assessment
Computer Networks and ISDN Systems
Computer Security and Industrial Cryptography: State of the Art and Evolution: ESAT Course, Leuven, Belgium, May 21-23, 1991
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Securing the core with an Enterprise Key Management Infrastructure (EKMI)
Proceedings of the 7th symposium on Identity and trust on the Internet
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
Hi-index | 0.00 |
In this paper a new approach is presented for key management access and sharing secret keys between certified users of a group. Such schemes are referred to as Symmetric Key Management Systems. The concept of information lifecycle management is first presented and analysed in the context of data storage efficiency. This concept is then extended for use with the management of symmetric secret keys. The need for a standard in symmetric secret key management is presented and founded on software engineering principles. A novel scheme contributing in this direction is hence presented. Specifically, access controls processes are presented that are based on passwords. These passwords, with the additional use of the AES cryptographic algorithm and nonces can be used to provide not only authentication for the access control in the system but additionally for the access in the encrypted file that stores all the symmetrical secret keys of each user of certified group. Following this, a new approach for the lifecycle management of secret keys is presented in order to achieve the secure communication based on encryption - decryption of all the messages in real time with the simultaneous use of two symmetrical secret keys for each transmission of information between the users. It is finally concluded that this innovative technology guarantees the automatic password and secret keys management lifecycle irrespective of the actions of the users and provides secure communication between certified group of users in local network and in internet.