Management of Secret Keys: Dynamic Key Handling
نویسنده
چکیده
In this paper we describe mechanisms for the management of secret keys, used in the securization of financial applications. The mechanisms Dynamic Key Handling and Reversed Dynamic Key Handling can be seen as particular methods to diversify keys in time, compatible with the present diversification by terminal and/or electronic purse.
منابع مشابه
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation
In the key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Typically, a class requires public and secret information to derive the keys of its descendant classes. There have been many key assignment schemes proposed in recent years that support updates t...
متن کاملA Key Management Protocol for Hierachical Wireless Sensor Networks
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important issue for WSNs. This paper proposes a novel...
متن کاملApplied Security — Final exam review
Answer: Long-term storage of keys, specially in disk, must take into account handling of backups and possible direct access to the underlying media. Therefore, keys’ long term storage should take place in encrypted format. For instance, an administrative password may be used to encrypt the keys. Even better, keys could be encrypted using an administrative key that is physically protected in phy...
متن کاملApplication of the Central Encryption System in the Dynamic Secret Sharing Scheme (II)
In 1979, Shamir and Blakley independently proposed the concept of secret key decentralization (Shamir, A, 1979, P.612-613 & Backly, G. R, 1979), and the mechanism implementing this idea was called as the (t, n)-threshold scheme. In two schemes, one secret key (the secret key of the system) was divided into n parts (n sub-secret keys) respectively kept by n persons, and for certain integer t(t<n...
متن کاملAn Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...
متن کامل