Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.
Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
Successful key management is critical to the security of a cryptosystem. In practice it is arguably the most difficult aspect of cryptography because it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
Read more about Key Management: Types of Keys, Key Exchange, Key Storage, Key Use, Public Key Infrastructure, Multicast Group Key Management, Challenges of Key Management, Types of Key Management Systems, Key Management Commercial Systems
Famous quotes containing the words key and/or management:
“There are two kinds of timiditytimidity of mind, and timidity of the nerves; physical timidity, and moral timidity. Each is independent of the other. The body may be frightened and quake while the mind remains calm and bold, and vice versë. This is the key to many eccentricities of conduct. When both kinds meet in the same man he will be good for nothing all his life.”
—Honoré De Balzac (17991850)
“People have described me as a management bishop but I say to my critics, Jesus was a management expert too.”
—George Carey (b. 1935)