Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
For efficient and secure transmissions of messages between the entities in the cryptosystem, there is always a need of encryption and decryption keys. Hence, keys play a significant role in the cryptosystem, and so managing keys is a paramount area of research. Key management system, policies and rules help the cryptosystem to assure security (i.e., confidentiality, authenticity of the participating entities and integrity) to the communicating entities. Key management allows an efficient and systematic key generation, key distribution, key exchange, and storage of keys, so that the participating entities can be able to communicate with the secure environment and remain immune to attacks. In the absence of an efficient key management system, the communicating entities are more prone to come into the contact of intruders which results in an insecure cryptosystem.
Cybersecurity for the Smart Grid
Published in Stuart Borlase, Smart Grids, 2018
Key management is the process that governs how keys are securely issued to users, applications, and devices. An automated process is recommended, especially when there are many devices that require them, and when messages are frequently sent. The frequency of use of a cryptographic key is directly proportional to how often the key should be changed. The more a key is used, the more likely it is to be compromised. The level of security needed, as shown in risk assessments, and the frequency of use can identify how often the keys should be updated. As more smart grid devices are being deployed that use cryptography, secure methods of distributing keys is very important. Key management is the most challenging part of cryptography and also the most crucial [24]. Every key in the system must be able to be updated or revoked on demand.
Network Reliability and Security
Published in Partha Pratim Sahu, Advances in Optical Networks and Components, 2020
There are different keys: master, primary, or key encryption keys. Keys used during the course of a single association between communication parties are known as working, secondary, or data encryption keys. Master keys are used to verify the authenticity of the communicating parties and to safely transmit working keys. Working keys are used exclusively to encrypt information on a single association. An important aspect is the management of these keys [26,27]. Key management includes generating, distributing, storing, entering, using and destroying or archiving cryptographic keys.
A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security
Published in IETE Journal of Research, 2023
V. Chegeni, H. Haj Seyyed Javadi, M.R. Moazami Goudarzi, A. Rezakhani
Key management is a set of techniques and procedures for establishing secure communications between authorized parties. It is vital for a secure connection in IoT as well. Key management includes four essential functions, namely analysis, assignment, generation, and distribution of network keys such as in Figure 2. A central server is responsible for storing the key pool and distributing the key. Key analysis: First, the number of keys required for the network, as well as the number of keys needed for each node, are analyzed.Key assignment: This step refers to the mapping of keys to different parts. In this case, a key assignment manager has the task of assigning the key to the parts that want to create a secure communication channel. Also, a key manager determines how many keys are assigned to each node to create a secure communication channel.Key generation: This step may occur once or several times over the life of the network. In the static key distribution scheme, the keys are generated by a central server and loaded in nodes before network development.Key distribution: This step involves delivering the generated keys to predefined nodes.
Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications
Published in IETE Journal of Research, 2023
K. Vivekrabinson, K. Muneeswaran
In the present Internet age, group communication is needed for sharing data among multiple members in the group [1]. In the conventional system, the security of the personal computer system is guaranteed by passwords and identity authentication. Many applications have been proposed to solve the real world problems. For example, the Schulze voting method [2] (different from traditional voting) finds the winner of the candidate without revealing the preferences of the voter. Some of the scheduling algorithms [3] have also been invented to manage the workflow of the applications in such a way that it reduces the execution time. In many cloud applications, key information plays a major role in protecting data. Therefore, it is necessary to design reliable key management schemes to improve the security of the digital resources in the cloud. In a centralized group key management scheme [4–16], a single authority called Key Server (KS) is responsible for generating group keys and other user keys of the entire group. In general, cloud computing is dynamic in nature, so the members can join or leave with the group at any time. Due to this dynamic nature, security issues like forward and backward secrecy are created. The key management technique involves generation, distribution, storage, verifying keys and revoking. Generally, the key management mechanism is divided into two categories, namely centralized and contributory scheme. A single server is responsible for generating all group keys and user keys in a centralized key management scheme upon any member joining/leaving. It leads to a single point failure of the entire network and needs some duration to recover. In the contributory key management scheme [17–22], the group key is computed from the keys of the group members upon any member joining/leaving. In a contributory method, if a key server goes offline then the group members contribute themselves to create the new group keys by sharing their key information with the sub-server.