SIKM - a smart cryptographic key management framework

被引:3
|
作者
Chaeikar, Saman Shojae [1 ]
Ahmadi, Ali [2 ]
Karamizadeh, Sasan [3 ]
Chaeikar, Nakisa Shoja [1 ]
机构
[1] Iranians Univ, Fac Comp Engn, Dept Informat Secur, E Inst Higher Educ, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Comp Engn, Dept Artificial Intelligence, Tehran, Iran
[3] ICT Res Inst, Dept ICT Secur, Tehran, Iran
来源
OPEN COMPUTER SCIENCE | 2022年 / 12卷 / 01期
关键词
cryptographic key management; symmetric key; secure communications; key exchange; key refreshment; PROTOCOL; SCHEME;
D O I
10.1515/comp-2020-0167
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals - minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
引用
收藏
页码:17 / 26
页数:10
相关论文
共 50 条
  • [21] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125
  • [22] Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys
    Lalith, T.
    Umarani, R.
    Kadharnawaz, G. M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (06) : 163 - 166
  • [23] A cryptographic key management solution for HIPAA privacy/security regulations
    Lee, Wei-Bin
    Lee, Chien-Ding
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2008, 12 (01): : 34 - 41
  • [24] Smart Healthcare Management Framework
    Reddy, D. Vidyadhara
    Harekal, Divakar
    INTERNATIONAL PROCEEDINGS ON ADVANCES IN SOFT COMPUTING, INTELLIGENT SYSTEMS AND APPLICATIONS, ASISA 2016, 2018, 628 : 291 - 298
  • [25] Cryptographic smart cards
    Gemplus
    IEEE Micro, 3 (14-24):
  • [26] Cryptographic smart cards
    Naccache, D
    MRaihi, D
    IEEE MICRO, 1996, 16 (03) : 14 - +
  • [27] Framework and key technologies of airport smart runway
    Ling, Jianming
    Fang, Yixin
    Zhang, Jiake
    Wu, Zhenji
    Zhao, Hongduo
    Shi, Rong
    Tumu Gongcheng Xuebao/China Civil Engineering Journal, 2022, 55 (02): : 120 - 128
  • [28] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS
    Yazdanpanah, Saeed
    Chaeikar, Saman Shojae
    Zamani, Mazdak
    Kourdi, Reza
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369
  • [29] Efficient Public-key Revocation Management for Secure Smart Meter Communications using One-way Cryptographic Accumulators
    Cebe, Mumin
    Akkaya, Kemal
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [30] Cryptographic key recovery
    AlSalqan, YY
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 34 - 37