Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.
Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
Successful key management is critical to the security of a cryptosystem. In practice it is arguably the most difficult aspect of cryptography because it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
Read more about Key Management: Types of Keys, Key Exchange, Key Storage, Key Use, Public Key Infrastructure, Multicast Group Key Management, Challenges of Key Management, Types of Key Management Systems, Key Management Commercial Systems
Famous quotes containing the words key and/or management:
“You have many choices. You can choose forgiveness over revenge, joy over despair. You can choose action over apathy.... You hold the key to how well you make the emotional adjustment to your divorce and consequently how well your children will adapt.”
—Stephanie Marston (20th century)
“No officer should be required or permitted to take part in the management of political organizations, caucuses, conventions, or election campaigns. Their right to vote and to express their views on public questions, either orally or through the press, is not denied, provided it does not interfere with the discharge of their official duties. No assessment for political purposes on officers or subordinates should be allowed.”
—Rutherford Birchard Hayes (18221893)