Key management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care. Advances in hardware security modules used in key storage and high-end and low-cost random number generator used in key generation show a promising future for secure and affordable key management. However, future challenges, such as quantum resilience, have to be overcome by new key management systems. For the military, existing experience in handling cryptographic keys could help develop a key management system, and the reputation of Switzerland could help promote key management systems developed in Switzerland.
CITATION STYLE
Krähenbühl, C., & Perrig, A. (2023). Key management. In Trends in Data Protection and Encryption Technologies (pp. 15–20). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_4
Mendeley helps you to discover research relevant for your work.