scholarly journals Lifetimes of Keys in Cryptographic Key Management Systems

Author(s):  
E. Okamoto ◽  
K. Nakamura
2021 ◽  
pp. 61-70
Author(s):  
Alexander Plotkin ◽  
◽  
Sergey Kesel ◽  
Maxim Repin ◽  
Nikolay Fedorov ◽  
...  

Abstract. Today, one of the most discussed topics in the field of information technology is distributed registry systems. They attract investors and developers with their functionality. Distributed ledger systems are being introduced into business processes in many areas of human activity, which makes their contribution to development irreplaceable. One of the most vulnerable parts of such systems is the process of managing cryptographic keys, an attack on which can destroy the entire security of the distributed registry system. The aim of the research is to identify possible threats to the process of managing cryptographic keys, on the basis of which recommendations and standards for managing cryptographic keys in distributed ledger systems will be developed. Research methods: to achieve this goal, the structure of the life cycle of cryptographic keys was considered, an analysis of possible vulnerabilities in the process of managing cryptographic keys at each stage of the life cycle of a cryptographic key was carried out. In addition, the distributed ledger system was analyzed in the context of the identified vulnerabilities of the key management process using the example of the IBM blockchain and the possibility of outsourcing cryptographic key management systems was considered. Result: a set of possible threats to the process of managing cryptographic keys was proposed, the necessity of assessing the security of the key management system before deciding on the introduction of these systems into distributed registries was proposed, conclusions were drawn about the need to develop recommendations and standards for the process of managing cryptographic keys for such systems, as well as the possibility applicability of the recommendations for assessing the security of the implementation of outsourcing of cryptographic key management systems in distributed ledgers.


Author(s):  
Elaine Barker ◽  
Miles Smid ◽  
Dennis Branstad ◽  
Santosh Chokhani

2013 ◽  
Author(s):  
Elaine Barker ◽  
Miles Smid ◽  
Dennis Branstad ◽  
Santosh Chokhani

2015 ◽  
Author(s):  
Elaine B. Barker ◽  
Miles Smid ◽  
Dennis Branstad

2010 ◽  
Vol 4 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Anne V. D. M. Kayem ◽  
Patrick Martin ◽  
Selim G. Akl

Sign in / Sign up

Export Citation Format

Share Document