Injecting trust to cryptographic key management

  • Authors:
  • Gökhan Bal;Andreas U. Schmidt;Nicolai Kuntze

  • Affiliations:
  • Goethe-University, Germany;Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany;Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany

  • Venue:
  • ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Notwithstanding the adoption of strong cryptographic mechanisms, the anticipated degree of security in the protection and management of privacy sensitive data can only be achieved, if secret keys can be shielded adequately. In practice, most implementations are based on software tokens that shall guard the keys against eavesdropping. This fact alleviates the hardness of circumvention of used cryptographic protocols and with this the disclosure of secret keys. In this paper we propose a key management architecture which - based on the capabilities of Trusted Computing Technology - will provide a higher level of security.