SIKM - a smart cryptographic key management framework

被引:3
|
作者
Chaeikar, Saman Shojae [1 ]
Ahmadi, Ali [2 ]
Karamizadeh, Sasan [3 ]
Chaeikar, Nakisa Shoja [1 ]
机构
[1] Iranians Univ, Fac Comp Engn, Dept Informat Secur, E Inst Higher Educ, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Comp Engn, Dept Artificial Intelligence, Tehran, Iran
[3] ICT Res Inst, Dept ICT Secur, Tehran, Iran
来源
OPEN COMPUTER SCIENCE | 2022年 / 12卷 / 01期
关键词
cryptographic key management; symmetric key; secure communications; key exchange; key refreshment; PROTOCOL; SCHEME;
D O I
10.1515/comp-2020-0167
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals - minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
引用
收藏
页码:17 / 26
页数:10
相关论文
共 50 条
  • [11] Scalable cryptographic key management in wireless sensor networks
    Wadaa, A
    Olariu, S
    Wilson, L
    Eltoweissy, M
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 796 - 802
  • [12] Cryptographic key management for SCADA systems -: issues and perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 156 - 161
  • [13] Cryptographic Key Management for SCADA Systems, Issues and Perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40
  • [14] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [15] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [16] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309
  • [17] Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City
    Toapanta Toapanta, Segundo Moises
    Mendoza Quimi, Felix Gustavo
    Reina Salazar, Ruben Franklin
    Mafla Gallegos, Luis Enrique
    FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, 2020, 1027 : 449 - 461
  • [18] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING
    Delgado Barroso, John Manuel
    Joyanes Aguilar, Luis
    Garcia Gundin, Pablo
    KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
  • [19] A Generic Security API for Symmetric Key Management on Cryptographic Devices
    Cortier, Veronique
    Steel, Graham
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 605 - +
  • [20] A generic security API for symmetric key management on cryptographic devices
    Cortier, Veronique
    Steel, Graham
    INFORMATION AND COMPUTATION, 2014, 238 : 208 - 232