Đang chuẩn bị liên kết để tải về tài liệu:
Handbook of Applied Cryptography - chap13

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

This chapter considers key management techniques for controlling the distribution, use, and update of cryptographic keys. Whereas Chapter 12 focuses on details of specific key establishment protocols which provide shared secret keys, here the focus is on communications models for key establishment and use, classification and control of keys based on their intended use, techniques for the distribution of public keys, architectures supporting automated key updates in distributed systems, and the roles of trusted third parties | This is a Chapter from the Handbook of Applied Cryptography by A. Menezes P. van Oorschot and S. Vanstone CRC Press 1996. For further information see www.cacr.math.uwaterloo.ca hac CRC Press has granted the following specihc permissions for the electronic version of this book Permission is granted to retrieve print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book photocopying or producing copies for other than personal use of the person creating the copy or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specihc permission above the standard copyright notice from CRC Press applies to this electronic version Neither this book nor any part may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying microhlming and recording or by any information storage or retrieval system without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution for promotion for creating new works or for resale. Specihc permission must be obtained in writing from CRC Press for such copying. @1997 by CRC Press Inc. Chapter Key Management Techniques Contents in Brief 13.1 Introduction.543 13.2 Background and basic concepts.544 13.3 Techniques for distributing confidential keys.551 13.4 Techniques for distributing public keys .555 13.5 Techniques for controlling key usage.567 13.6 Key management involving multiple domains.570 13.7 Key life cycle issues.577 13.8 Advanced trusted third party services.581 13.9 Notes and further references.586 13.1 Introduction This chapter considers key management techniques for controlling the distribution use and update of cryptographic keys. Whereas Chapter 12 focuses on details of specific key establishment protocols which provide shared secret keys here the focus is on .

TÀI LIỆU LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.