Cryptographic key recovery

被引:3
|
作者
AlSalqan, YY
机构
关键词
D O I
10.1109/FTDCS.1997.644700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet/Intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach the expected potential. Security can be achieved via encryption. Encryption uses ''keys'' to encrypt and decrypt the information. Without having the cryptographic key, the ciphered information will never be converted into its original text. In case of key loss or damage or forgetting the key password; there should be a mechanism to recover the cryptographic keys and decipher the encrypted information. This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data. The mechanism does not require keys to be escrowed. It is based on adding an extra, small, field - Key Recovery Entry (KRE) to a message or file being transmitted. This mechanism facilitates key recovery for both session-keys in symmetric cryptographic system, and private keys in the asymmetric cryptographic systems without any need to escrow any key information. The author makes the differentiation between key escrow and key recovery.
引用
收藏
页码:34 / 37
页数:4
相关论文
共 50 条
  • [21] Cryptographic key agreement for mobile radio
    Hassan, AA
    Stark, WE
    Hershey, JE
    Chennakeshu, S
    DIGITAL SIGNAL PROCESSING, 1996, 6 (04) : 207 - 212
  • [22] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT
    Nyssanbayeva, S. E.
    Kapalova, N. A.
    Haumen, A.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
  • [23] Random Room Noise for Cryptographic Key
    Abu, Nur Aman
    Muslim, Zulkiflee
    2008 2ND IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2008, : 46 - 52
  • [24] Cryptographic key generation from voice
    Monrose, F
    Reiter, MK
    Li, Q
    Wetzel, S
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213
  • [25] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [26] A Lightweight Cryptographic Scheme with Dynamic Key
    Wu, Yuxin
    Wang, Jing
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 232 - 236
  • [27] PGP cryptographic keys and key rings
    Crainicu, Bogdan
    Marusteri, Marius
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 138 - 141
  • [28] Comments on a cryptographic key assignment scheme
    Tang, Q
    Mitchell, CJ
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326
  • [29] Specification and analysis of n-way key recovery system by Extended Cryptographic Timed Petri Net
    Lim, SY
    Ko, JH
    Jun, EA
    Lee, GS
    JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 93 - 106
  • [30] Probabilistic model of cryptographic key collisions in relation to the key length
    Van Hecke, T. (tanja.vanhecke@ugent.be), 2016, Applied Probability Trust (41):