SIKM - a smart cryptographic key management framework

被引:3
|
作者
Chaeikar, Saman Shojae [1 ]
Ahmadi, Ali [2 ]
Karamizadeh, Sasan [3 ]
Chaeikar, Nakisa Shoja [1 ]
机构
[1] Iranians Univ, Fac Comp Engn, Dept Informat Secur, E Inst Higher Educ, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Comp Engn, Dept Artificial Intelligence, Tehran, Iran
[3] ICT Res Inst, Dept ICT Secur, Tehran, Iran
来源
OPEN COMPUTER SCIENCE | 2022年 / 12卷 / 01期
关键词
cryptographic key management; symmetric key; secure communications; key exchange; key refreshment; PROTOCOL; SCHEME;
D O I
10.1515/comp-2020-0167
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals - minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
引用
收藏
页码:17 / 26
页数:10
相关论文
共 50 条
  • [1] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [2] A Framework for Self-Protecting Cryptographic Key Management
    Kayem, Anne V. D. M.
    Martin, Patrick
    Akl, Selim G.
    Powley, Wendy
    SASO 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2008, : 191 - 200
  • [3] Cryptographic key management for the masses
    Potter, Bruce
    Network Security, 2006, 2006 (12) : 13 - 14
  • [4] A Key Management Framework for AMI Networks in Smart Grid
    Das, Subir
    Ohba, Yoshihiro
    Kanda, Mitsuru
    Famolari, David
    Das, Sajal K.
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) : 30 - 37
  • [5] Injecting Trust to Cryptographic Key Management
    Bal, Goekhan
    Schmidt, Andreas U.
    Kuntze, Nicolai
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1197 - +
  • [6] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [7] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT
    Nyssanbayeva, S. E.
    Kapalova, N. A.
    Haumen, A.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
  • [8] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [9] The Novel Cryptographic Key Generation and Distribution Scheme for Smart Grid
    Wang, Zhidong
    Liu, Piao
    Lin, Peixia
    Yang, Zhibin
    Liang, Mei
    Zuo, Hanmu
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 873 - 875
  • [10] Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
    Sabri, Khair Eddin
    Khedri, Ridha
    FUNDAMENTA INFORMATICAE, 2011, 112 (04) : 305 - 335