[Next] [Up] [Previous]
Next: Key Management Issues Up: Technology Tools for Previous: Tokens dumb and

Key Management

The only reasonable ways to protect the integrity and privacy of information is to rely upon the use of secret information in the form of private keys for signing and/or encryption. The management and handling of these pieces of secret information is generally referred to as ``key management''. This includes the activities of selection, exchange, storage, certification, expiration, revocation, changing, and transmission of keys. Most of the work in managing information security systems lies in the key management.

Kevin S. McCurley
Sat Mar 11 16:00:15 MST 1995