Definition[edit | edit source]

Internet security protocols use various key management approaches, including: pre-shared keys (e.g., manually initialized, or communicating parties mutually derive a new key for data protection), public key cryptography (key agreement, key transport), and Key Distribution Centers (the KDC has a secret key for every subscriber, and generates and distributes a subscriber-subscriber data protection key using the KDC-subscriber keys).

Overview[edit | edit source]

Nearly all Internet security protocols use cryptography for authentication, integrity and/or confidentiality, and hence, require key management (KM).

Community content is available under CC-BY-SA unless otherwise noted.