Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.
Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
Successful key management is critical to the security of a cryptosystem. In practice it is arguably the most difficult aspect of cryptography because it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
Read more about Key Management: Types of Keys, Key Exchange, Key Storage, Key Use, Public Key Infrastructure, Multicast Group Key Management, Challenges of Key Management, Types of Key Management Systems, Key Management Commercial Systems
Famous quotes containing the words key and/or management:
“The knight slew the dragon,
The lady was gay,
They rode on together,
Away, away.”
—Unknown. This Is the Key (l. 3841)
“People have described me as a management bishop but I say to my critics, Jesus was a management expert too.”
—George Carey (b. 1935)