首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Key Management in Public Key Cryptosystem
  • 本地全文:下载
  • 作者:Prof. Vikas Malik ; Anju Sharma ; Annu Malik
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2013
  • 卷号:3
  • 期号:8
  • 出版社:S.S. Mishra
  • 摘要:This paper presents a survey on Key Management in Public Key Cryptosystem. This discussion is centered on overview of distribution of public and secret keys in public key cryptography. Key management is the management of cryptographic keysin a cryptosystem. This includes dealing with the generation, exchange, storage, use, and replacement of keys. It includes cryptographic protocoldesign, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher. The concept of public key cryptography was most appealing because it greatly simplifies some of the problems involved in distribution of secret keys. When applied to encryption, it allows a person sending a message to send a message that can only be read by the receiver, without having a need for the sender and receiver to agree on any secret key. The reason for this is that in public key cryptography, the key used for encryption is different from the key used for decryption. In practice, the methods that have been developed for realizing public key encryption are comparatively slow, and public key cryptography is generally used for encrypting ``session keys'' that are then used for a faster traditional single-key encryption method such as the Data Encryption Standard (DES). In addition to the convenience of key management for encryption provided by public key cryptography, it also provides a means to implement digital signatures. The separation of public and private keys is exactly what is required to allow users to sign their data (with their secret key), allow others to verify their signatures with the public key, but not have to disclose their secret key in the process.
  • 关键词:Key Management; public keys distribution; secret keys distribution ; certificate authority
国家哲学社会科学文献中心版权所有