Key Management Techniques

  • Authors:
  • Walter Fumy

  • Affiliations:
  • -

  • Venue:
  • State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use. This article describes such techniques, and especially a variety of key establishment mechanisms. In addition, relevant standardization activities are discussed.