【文章內(nèi)容簡介】
encryption decryption plaintext plaintext symmetric key generator secret key secret key ciphertext Key management techniques b) publickey encryption encryption decryption asymmetric key pair generation plaintext ciphertext plaintext public key private key secure channel (private and authentication) secure channel (authentication only) unsecured channel (no protection) Key management techniques ? Techniques for distributing confidential keys Key layering and symmetrickey certificates Key layering: 1. master keys – keys at the highest level in the hierarchy 2. keyencrypting keys – symmetric keys or encryption public keys used for key transport or storage of other keys 3. data keys – used to provide cryptographic operations on user data Key management techniques symmetrickey certificates: Symmetrickey certificates provide a means for a KTC(Key Translation Center) to avoid the requirement of either maintaining a secure database of user secrets (or duplicating such a database for multiple servers), or retrieving such keys from a database upon translation requests. Key management techniques ? Techniques for distributing public keys Authentication trees Authentication trees provide a method for making public data available with verifiable authenticity, by using a tree structure in conjunction with a suitable hash function, and authenticating the root value