Cryptographic Key Management Concepts

2007 ◽  
pp. 1112-1123
2021 ◽  
pp. 61-70
Author(s):  
Alexander Plotkin ◽  
◽  
Sergey Kesel ◽  
Maxim Repin ◽  
Nikolay Fedorov ◽  
...  

Abstract. Today, one of the most discussed topics in the field of information technology is distributed registry systems. They attract investors and developers with their functionality. Distributed ledger systems are being introduced into business processes in many areas of human activity, which makes their contribution to development irreplaceable. One of the most vulnerable parts of such systems is the process of managing cryptographic keys, an attack on which can destroy the entire security of the distributed registry system. The aim of the research is to identify possible threats to the process of managing cryptographic keys, on the basis of which recommendations and standards for managing cryptographic keys in distributed ledger systems will be developed. Research methods: to achieve this goal, the structure of the life cycle of cryptographic keys was considered, an analysis of possible vulnerabilities in the process of managing cryptographic keys at each stage of the life cycle of a cryptographic key was carried out. In addition, the distributed ledger system was analyzed in the context of the identified vulnerabilities of the key management process using the example of the IBM blockchain and the possibility of outsourcing cryptographic key management systems was considered. Result: a set of possible threats to the process of managing cryptographic keys was proposed, the necessity of assessing the security of the key management system before deciding on the introduction of these systems into distributed registries was proposed, conclusions were drawn about the need to develop recommendations and standards for the process of managing cryptographic keys for such systems, as well as the possibility applicability of the recommendations for assessing the security of the implementation of outsourcing of cryptographic key management systems in distributed ledgers.


Author(s):  
Elaine Barker ◽  
Miles Smid ◽  
Dennis Branstad ◽  
Santosh Chokhani

Author(s):  
Keith M. Martin

This chapter provides an understanding of the fundamental principles behind key management. We consider the typical stages in the lifecycle of a cryptographic key and then review each of these stages in some detail. We discuss the choosing of key lengths and look at different techniques for key generation, including key derivation and generation from components. We then look at different techniques for key establishment, including the use of key hierarchies, key wrapping, and quantum key establishment. We then look at key storage and discuss the role of hardware security modules. We also consider key separation, key change, and key destruction, before closing with a short discussion on governance of key management.


Sign in / Sign up

Export Citation Format

Share Document