Cryptographic key recovery

被引:3
|
作者
AlSalqan, YY
机构
关键词
D O I
10.1109/FTDCS.1997.644700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet/Intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach the expected potential. Security can be achieved via encryption. Encryption uses ''keys'' to encrypt and decrypt the information. Without having the cryptographic key, the ciphered information will never be converted into its original text. In case of key loss or damage or forgetting the key password; there should be a mechanism to recover the cryptographic keys and decipher the encrypted information. This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data. The mechanism does not require keys to be escrowed. It is based on adding an extra, small, field - Key Recovery Entry (KRE) to a message or file being transmitted. This mechanism facilitates key recovery for both session-keys in symmetric cryptographic system, and private keys in the asymmetric cryptographic systems without any need to escrow any key information. The author makes the differentiation between key escrow and key recovery.
引用
收藏
页码:34 / 37
页数:4
相关论文
共 50 条
  • [41] No Random, No Ransom: A Key to Stop Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 234 - 255
  • [42] Improvement over Public Key Cryptographic Algorithm
    Garg, Deepak
    Verma, Seema
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739
  • [43] On the cryptographic key secrecy of the strengthened Yahalom protocol
    Backes, Michael
    Pfitzmann, Birgit
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 233 - +
  • [44] Practical Aspects of Quantum Cryptographic Key Distribution
    H. Zbinden
    N. Gisin
    B. Huttner
    A. Muller
    W. Tittel
    Journal of Cryptology, 2000, 13 : 207 - 220
  • [45] 109-bit cryptographic key cracked
    不详
    IEEE CONCURRENCY, 2000, 8 (02): : 7 - 7
  • [46] Design of a variable key length cryptographic processor
    Bharathwaj, SV
    Kishore, LN
    Arulalan, MR
    Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
  • [47] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [48] SIKM - a smart cryptographic key management framework
    Chaeikar, Saman Shojae
    Ahmadi, Ali
    Karamizadeh, Sasan
    Chaeikar, Nakisa Shoja
    OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
  • [49] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [50] Evaluating True Cryptographic Key Space Size
    Carlson, Albert
    Gang, Garret
    Gang, Torsten
    Ghosh, Bhaskar
    Dutta, Indira Kalyan
    2021 IEEE 12TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2021, : 243 - 249