Key Management Issues
Technology Tools for
Tokens dumb and
The only reasonable ways to protect the
integrity and privacy of information is to rely upon the use of secret
information in the form of private keys for signing and/or encryption.
The management and handling of these pieces of secret information is
generally referred to as ``key management''. This includes the
activities of selection, exchange, storage, certification, expiration,
revocation, changing, and transmission of keys. Most of the work in
managing information security systems lies in the key management.
Kevin S. McCurley
Sat Mar 11 16:00:15 MST 1995