Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.
Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
Successful key management is critical to the security of a cryptosystem. In practice it is arguably the most difficult aspect of cryptography because it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
Read more about Key Management: Types of Keys, Key Exchange, Key Storage, Key Use, Public Key Infrastructure, Multicast Group Key Management, Challenges of Key Management, Types of Key Management Systems, Key Management Commercial Systems
Famous quotes containing the words key and/or management:
“Power, in Cases world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldnt kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.”
—William Gibson (b. 1948)
“The Management Area of Cherokee
National Forest, interested in fish,
Has mapped Tellico and Bald Rivers
And North River, with the tributaries
Brookshire Branch and Sugar Cove Creed:
A fishy map for facile fishery....”
—Allen Tate (18991979)