Key management

0Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Key management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care. Advances in hardware security modules used in key storage and high-end and low-cost random number generator used in key generation show a promising future for secure and affordable key management. However, future challenges, such as quantum resilience, have to be overcome by new key management systems. For the military, existing experience in handling cryptographic keys could help develop a key management system, and the reputation of Switzerland could help promote key management systems developed in Switzerland.

Cite

CITATION STYLE

APA

Krähenbühl, C., & Perrig, A. (2023). Key management. In Trends in Data Protection and Encryption Technologies (pp. 15–20). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free