期刊文献+

密钥管理与密钥生命周期研究 被引量:8

Research on Key Management and Key Life Cycle Model
下载PDF
导出
摘要 许多系统借助加密技术来保证信息在存储、传输过程中的安全性,而密码系统中所使用的密钥或口令的安全性则成为系统的薄弱环节[1]。文章探讨了控制密钥的发布、使用和更新的一些密钥管理技术;介绍了对称加密系统、非对称加密系统、私人密钥和公开密钥等基本概念;讨论了密钥分割法、密钥分层法的基本思想;着重分析了密钥生命周期的各个阶段,最后给出了一种利用密钥分层技术实现保密通信的应用方案。 By the aid of cryptographic technologies, lots of systems ensure the information security during its storing and transmitting processes. This paper discusses key management techniques for controlling the distribution, use, and update of cryptographic keys; introduces basic concepts of symmetric cryptographic system, asymmetric cryptographic system, symmetric-key, public-key, and so on; discusses the ideas of key dividing and key layering; and focuses on details of key life cycle. In the end, this paper presents an application scheme of key layering in secure communication.
作者 杨常建
出处 《计算机与网络》 2012年第12期60-62,共3页 Computer & Network
关键词 密钥管理 密钥生命周期 对称密钥 公开密钥 key management key life cycle symmetric-key public-key
  • 相关文献

参考文献6

二级参考文献87

  • 1Stinson D R,Strobl R.Provably secure distributed schnorr signatures and a (t,n) threshold scheme for implicit certificates [A].ACISP 2001 [C].Australia:ACISP,2001. 被引量:1
  • 2Damgrd I,Koprowski M.Practical threshold RSA signatures without a trusted dealer [A].LNCS,2045 [C].Springer-Verlag,Berlin:LNSC,2001. 被引量:1
  • 3Hirt M,Maurer U.Robustness for free in unconditional multi-party computation [A].LNCS,2139 [C].Springer-Verlag,Berlin:LNCS.2001. 被引量:1
  • 4Cramer R,Damgrd I.Secure distributed linear algebra in a constant number of rounds [A].LNCS,2139 [C].Springer-Verlag,Berlin:LNCS,2001. 被引量:1
  • 5Ayako Maeda,Atsuko Miyaji,and Mitsuru Tada.Efficient and unconditionally secure verifiable threshold changeable scheme [A].ACISP 2001 [C].Australia:ACISP,2001. 被引量:1
  • 6He J,Dawson E.Multisecret-sharing scheme based on one-way function [J].Electron.Lett.,1995,31(2):93-95. 被引量:1
  • 7Shamir,A.How to share a secret[J].Communications of the ACM,1979,24(11):612-613. 被引量:1
  • 8Blakley,G R Safeguarding cryptographic keys [A].Proceedings of the National Computer Conference[C],Montvale:NCC,1979. 被引量:1
  • 9Karnin E D.,Green J W.,Hellman M E.,On secret sharing systems [J].IEEE Trans.,1983,IT-29(1):35-41. 被引量:1
  • 10Benloh J C.,Secret sharing homomorphisms:Keeping shares of a secret secret [A].Advances in cryptology-CRYPTO'86 [C].California:CRYPTO,1986. 被引量:1

共引文献16

同被引文献40

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部