Skip to main content

Key Management

  • Reference work entry
Encyclopedia of Multimedia
  • 171 Accesses

Definition

Key management refers to an encryption algorithm and deals with the secure generation, distribution, storage, and disposal of keys.

The security of an encryption algorithm often depends on the strength of the encryption algorithm and the key two factors. In practice, most attacks on public-key systems are targeted at the key management level instead of the cryptographic algorithm itself. When a key is compromised, the entire system maybe compromised. Hence it is extremely important to secure the keys. This is the task of key management.

Key management deals with the secure generation, distribution, storage, and disposal of keys [1]. In other words, one must be able to get the key/s for the targeted application with the targeted security and efficiency requirement; the key/s must be stored securely so that no intruders can get it; legitimate users must be able to acquire the key/s for legitimate uses; and the lost or compromised keys are ready to be replaced and made aware...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. RSA Laboratories, “RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography,” Version 4.1, RSA Security Inc., 2000.

    Google Scholar 

  2. A.M. Eskicioglu, “Multimedia Security in Group Communications: Recent Progress in Key Management, Authentication, and Watermarking,” ACM Multimedia Systems Journal, Special Issue on Multimedia Security, pp. 239–248, September 2003.

    Google Scholar 

  3. D. Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architectures,” The Internet Society RFC 2627, June 1999.

    Google Scholar 

  4. L. Dondeti, B. Decleene, S. Griffin, T. Hardjono, J. Kurose, D. Towsley, C. Zhang, and S. Vasudevan, “Group Key Management in Wireless and Mobile Environment,” IETF Internet Draft (draft-dondeti-irtf-smug-gkm-mobility-00.txt), January 2002.

    Google Scholar 

Download references

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

(2008). Key Management. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_102

Download citation

Publish with us

Policies and ethics