Intelligent Management of the Cryptographic Keys


  • Gabriela Moise Petroleum-Gas University of Ploiesti Romania, 100680 Ploiesti, 39 Bvd. Bucuresti
  • Otilia Cangea Petroleum-Gas University of Ploiesti Romania, 100680 Ploiesti, 39 Bvd. Bucuresti


cryptographic key management, intelligent agents, key management model


With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.


Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer System,3 (1), 1983.

Hassen, R. H., Bouabdallah A., Bettahar, H., Challal, Y., Key management for content access control in a hierarchy, Computer Networks, 51 3197-3219, 2007.

Lin, J. C., Huang, K. H., Lai, L., Lee, H. C., Secure and efficient group key management with shared key derivation, it Computer Standards and Interfaces, 31, 2009.

MacKinnon, S., Taylor, P., Meijer, H., Akl, S., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers, C-34 (9), 1985.

Matyas, S. M., Le, A.V. Abraham, D. G., A Key-Management Scheme Based on Control Vectors, IBM Systems Journal, Vol. 2, Issue 3, 1991.

Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996.

Michener, J. R., Acar, T., Security Domains: Key Management in Large-Scale Systems,IEEE SOFTWARE, 2000.

Savard, J. J. G., A Cryptographic Compendium, jscrypt.htm, accessed on the December 5th, 2009.

Müller, J. P., The Design of Intelligent Agents: A Layered Approach. Lecture notes in computer science, Lecture notes in artificial intelligence, 1177, Springer-Verlag, 1996.

Wong, C.K., Gouda, M., Lam, S., Secure groups communication using key graphs,Proceedings of the ACM SIGCOMM'98, 1998.

Key management in cryptography, k2003/Lectures/g33keymgmt.ppt, accessed on December 10, 2009.

Chinese Remainder Theorem,∼jon.pitts/courses/ 2005c/470/supplements/chinese.pdf, accessed on December 10, 2009.

Zhou, J., Ou, O. H., Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme, Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ISBN:978-3-642-03094-9, 2009.



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.