key management


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Wikipedia.

key management

In cryptography, the creation, distribution and maintenance of the keys. See secret-key cryptography, public key cryptography, QKD, elliptic curve cryptography, Diffie-Hellman, cryptography, session key and security protocol.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
[15] Eschenauer L, Gligor VD, "A key management scheme for distributed sensor networks," in Proc.
* We propose approaches for secure and efficient in-vehicle key management, which handle key management of ECUs in each vehicle itself rather than on an OEM backend.
WinMagic provides intelligent key management for everything encryption, with robust, manageable and easy-to-use data security solutions.
"Gemalto's SafeNet Luna HSM for service providers addresses a current gap in the market for encryption and key management," said Garrett Bekker, senior security analyst at 451 Research.
The companies are utilizing OASIS Key Management Interoperability Protocol (KMIP) conformant technology to explore the way key management technologies can be deployed.
"With Traka's key management system, all these will become obsolete and businesses will be better secured and protected from any unwanted security risks and breaches which may then cause much bigger damage like theft, tampering or even fire," he said.
There are various evaluation metrics to be analyzed while choosing a dynamic key management scheme.
Key updating is very important in key management because the more often a key is used, the less secure it will be.
"Compliance and key management continue to burden our customers," said Dan Schiappa, senior vice president, Products, RSA, The Security Division of EMC.
"As large organizations deploy a myriad of encryption technologies, vendor-specific key management systems can't provide enterprise class security operations or support business continuity objectives, and they often lack functionality that is critical for business enablement -- such as the ability to share keys across the network," said Jon Oltsik, principal analyst at the Enterprise Strategy Group.
"We are delighted to offer our customers the security and ease-of-use that Identity-Based Encryption provides, combined with our in-the-cloud key management. This initial solution is a solid foundation for future expanded encryption offerings."
The Army Key Management System is a fielded system composed of three sub-systems, Local Communications Security Management Software, Automated Communications Engineering Software, and the Data Transfer Device with Common Tier 3 software.