Show Summary Details

p. 1078. Key managementlocked

  • Fred Piper
  •  and Sean Murphy


The security of any cryptographic system is totally dependent on the security of the keys. ‘Key management’ explains how keys must be protected during all phases of their life cycle — key generation, distribution, storage, usage, change, and destruction. It looks at the risks to which keys are likely to be exposed, and discusses some practical solutions. To be effective, a key management scheme needs to be carefully chosen to ensure that it meets the business needs and implementation requirements of the system. Key hierarchies are explained along with management of keys in networks using a trusted management centre. Finally key recovery and back-up are reviewed.

Access to the complete content on Very Short Introductions online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.

Please subscribe or login to access full text content.

If you have purchased a print title that contains an access token, please see the token for information about how to register your code.

For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.