Intelligent Management of the Cryptographic Keys
Keywords:cryptographic key management, intelligent agents, key management model
AbstractWith the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by JÅ‘rg MÅ±ller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.
Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer System,3 (1), 1983. http://dx.doi.org/10.1145/357369.357372
Hassen, R. H., Bouabdallah A., Bettahar, H., Challal, Y., Key management for content access control in a hierarchy, Computer Networks, 51 3197-3219, 2007. http://dx.doi.org/10.1016/j.comnet.2006.12.011
Lin, J. C., Huang, K. H., Lai, L., Lee, H. C., Secure and efficient group key management with shared key derivation, it Computer Standards and Interfaces, 31, 2009. http://dx.doi.org/10.1016/j.csi.2007.11.005
MacKinnon, S., Taylor, P., Meijer, H., Akl, S., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers, C-34 (9), 1985. http://dx.doi.org/10.1109/TC.1985.1676635
Matyas, S. M., Le, A.V. Abraham, D. G., A Key-Management Scheme Based on Control Vectors, IBM Systems Journal, Vol. 2, Issue 3, 1991.
Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996. http://dx.doi.org/10.1201/9781439821916
Michener, J. R., Acar, T., Security Domains: Key Management in Large-Scale Systems,IEEE SOFTWARE, 2000. http://dx.doi.org/10.1109/52.877864
Savard, J. J. G., A Cryptographic Compendium, http://www.quadibloc.com/crypto/ jscrypt.htm, accessed on the December 5th, 2009.
Müller, J. P., The Design of Intelligent Agents: A Layered Approach. Lecture notes in computer science, Lecture notes in artificial intelligence, 1177, Springer-Verlag, 1996. http://dx.doi.org/10.1007/BFb0017806
Wong, C.K., Gouda, M., Lam, S., Secure groups communication using key graphs,Proceedings of the ACM SIGCOMM'98, 1998. http://dx.doi.org/10.1145/285237.285260
Key management in cryptography, http://www.netlab.tkk.fi/opetus/s38153/ k2003/Lectures/g33keymgmt.ppt, accessed on December 10, 2009.
Chinese Remainder Theorem, http://www.math.tamu.edu/âˆ¼jon.pitts/courses/ 2005c/470/supplements/chinese.pdf, accessed on December 10, 2009.
Zhou, J., Ou, O. H., Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme, Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ISBN:978-3-642-03094-9, 2009. http://dx.doi.org/10.1007/978-3-642-03095-6_26
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.