Intelligent Management of the Cryptographic Keys

Authors

  • Gabriela Moise Petroleum-Gas University of Ploiesti Romania, 100680 Ploiesti, 39 Bvd. Bucuresti
  • Otilia Cangea Petroleum-Gas University of Ploiesti Romania, 100680 Ploiesti, 39 Bvd. Bucuresti

Keywords:

cryptographic key management, intelligent agents, key management model

Abstract

With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.

References

Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer System,3 (1), 1983. http://dx.doi.org/10.1145/357369.357372

Hassen, R. H., Bouabdallah A., Bettahar, H., Challal, Y., Key management for content access control in a hierarchy, Computer Networks, 51 3197-3219, 2007. http://dx.doi.org/10.1016/j.comnet.2006.12.011

Lin, J. C., Huang, K. H., Lai, L., Lee, H. C., Secure and efficient group key management with shared key derivation, it Computer Standards and Interfaces, 31, 2009. http://dx.doi.org/10.1016/j.csi.2007.11.005

MacKinnon, S., Taylor, P., Meijer, H., Akl, S., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers, C-34 (9), 1985. http://dx.doi.org/10.1109/TC.1985.1676635

Matyas, S. M., Le, A.V. Abraham, D. G., A Key-Management Scheme Based on Control Vectors, IBM Systems Journal, Vol. 2, Issue 3, 1991.

Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996. http://dx.doi.org/10.1201/9781439821916

Michener, J. R., Acar, T., Security Domains: Key Management in Large-Scale Systems,IEEE SOFTWARE, 2000. http://dx.doi.org/10.1109/52.877864

Savard, J. J. G., A Cryptographic Compendium, http://www.quadibloc.com/crypto/ jscrypt.htm, accessed on the December 5th, 2009.

Müller, J. P., The Design of Intelligent Agents: A Layered Approach. Lecture notes in computer science, Lecture notes in artificial intelligence, 1177, Springer-Verlag, 1996. http://dx.doi.org/10.1007/BFb0017806

Wong, C.K., Gouda, M., Lam, S., Secure groups communication using key graphs,Proceedings of the ACM SIGCOMM'98, 1998. http://dx.doi.org/10.1145/285237.285260

Key management in cryptography, http://www.netlab.tkk.fi/opetus/s38153/ k2003/Lectures/g33keymgmt.ppt, accessed on December 10, 2009.

Chinese Remainder Theorem, http://www.math.tamu.edu/∼jon.pitts/courses/ 2005c/470/supplements/chinese.pdf, accessed on December 10, 2009.

Zhou, J., Ou, O. H., Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme, Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ISBN:978-3-642-03094-9, 2009. http://dx.doi.org/10.1007/978-3-642-03095-6_26

Published

2011-03-01

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.