The IT Law Wiki
Advertisement

Definition[]

Internet security protocols use various key management approaches, including: pre-shared keys (e.g., manually initialized, or communicating parties mutually derive a new key for data protection), public key cryptography (key agreement, key transport), and Key Distribution Centers (the KDC has a secret key for every subscriber, and generates and distributes a subscriber-subscriber data protection key using the KDC-subscriber keys).

Overview[]

Nearly all Internet security protocols use cryptography for authentication, integrity and/or confidentiality, and hence, require key management (KM).

Advertisement