Loading…

Intelligent Management of the Cryptographic Keys

With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be eith...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computers, communications & control communications & control, 2011-03, Vol.6 (1), p.150
Main Authors: Moise, Gabriela, Cangea, Otilia
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 1
container_start_page 150
container_title International journal of computers, communications & control
container_volume 6
creator Moise, Gabriela
Cangea, Otilia
description With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.
doi_str_mv 10.15837/ijccc.2011.1.2209
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2518393678</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2518393678</sourcerecordid><originalsourceid>FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003</originalsourceid><addsrcrecordid>eNo9jstOwzAURC0EElXpD7CKxDrB9_q9RBGPiiI2sK4c20kThSTE7qJ_TxAVs5mzOjOE3AItQGim7tvOOVcgBSigQKTmgqxAc8iN5vzyn5m8JpsYO7qEoaZKrAjdDin0fduEIWVvdrBN-PrFsc7SIWTlfJrS2Mx2OrQuew2neEOuatvHsDn3mnw-PX6UL_nu_XlbPuxyhyhTjkzLELzlTEgvkFtTV15CQO-U4lQoZTVIo6pKoJShBoGqoh6Y8Yyy5d-a3P15p3n8PoaY9t14nIdlco8CNDNMKs1-AD-ERlM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2518393678</pqid></control><display><type>article</type><title>Intelligent Management of the Cryptographic Keys</title><source>Publicly Available Content Database</source><creator>Moise, Gabriela ; Cangea, Otilia</creator><creatorcontrib>Moise, Gabriela ; Cangea, Otilia</creatorcontrib><description>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</description><identifier>ISSN: 1841-9836</identifier><identifier>EISSN: 1841-9844</identifier><identifier>DOI: 10.15837/ijccc.2011.1.2209</identifier><language>eng</language><publisher>Oradea: Agora University of Oradea</publisher><subject>Algorithms ; Computers ; Cryptography ; Emergency preparedness ; Encryption ; Intelligent agents ; Interoperability ; Management systems ; Security ; Security systems ; Standardization</subject><ispartof>International journal of computers, communications &amp; control, 2011-03, Vol.6 (1), p.150</ispartof><rights>2011. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2518393678?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Moise, Gabriela</creatorcontrib><creatorcontrib>Cangea, Otilia</creatorcontrib><title>Intelligent Management of the Cryptographic Keys</title><title>International journal of computers, communications &amp; control</title><description>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</description><subject>Algorithms</subject><subject>Computers</subject><subject>Cryptography</subject><subject>Emergency preparedness</subject><subject>Encryption</subject><subject>Intelligent agents</subject><subject>Interoperability</subject><subject>Management systems</subject><subject>Security</subject><subject>Security systems</subject><subject>Standardization</subject><issn>1841-9836</issn><issn>1841-9844</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNo9jstOwzAURC0EElXpD7CKxDrB9_q9RBGPiiI2sK4c20kThSTE7qJ_TxAVs5mzOjOE3AItQGim7tvOOVcgBSigQKTmgqxAc8iN5vzyn5m8JpsYO7qEoaZKrAjdDin0fduEIWVvdrBN-PrFsc7SIWTlfJrS2Mx2OrQuew2neEOuatvHsDn3mnw-PX6UL_nu_XlbPuxyhyhTjkzLELzlTEgvkFtTV15CQO-U4lQoZTVIo6pKoJShBoGqoh6Y8Yyy5d-a3P15p3n8PoaY9t14nIdlco8CNDNMKs1-AD-ERlM</recordid><startdate>20110301</startdate><enddate>20110301</enddate><creator>Moise, Gabriela</creator><creator>Cangea, Otilia</creator><general>Agora University of Oradea</general><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20110301</creationdate><title>Intelligent Management of the Cryptographic Keys</title><author>Moise, Gabriela ; Cangea, Otilia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>Computers</topic><topic>Cryptography</topic><topic>Emergency preparedness</topic><topic>Encryption</topic><topic>Intelligent agents</topic><topic>Interoperability</topic><topic>Management systems</topic><topic>Security</topic><topic>Security systems</topic><topic>Standardization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Moise, Gabriela</creatorcontrib><creatorcontrib>Cangea, Otilia</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>International journal of computers, communications &amp; control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Moise, Gabriela</au><au>Cangea, Otilia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intelligent Management of the Cryptographic Keys</atitle><jtitle>International journal of computers, communications &amp; control</jtitle><date>2011-03-01</date><risdate>2011</risdate><volume>6</volume><issue>1</issue><spage>150</spage><pages>150-</pages><issn>1841-9836</issn><eissn>1841-9844</eissn><abstract>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</abstract><cop>Oradea</cop><pub>Agora University of Oradea</pub><doi>10.15837/ijccc.2011.1.2209</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1841-9836
ispartof International journal of computers, communications & control, 2011-03, Vol.6 (1), p.150
issn 1841-9836
1841-9844
language eng
recordid cdi_proquest_journals_2518393678
source Publicly Available Content Database
subjects Algorithms
Computers
Cryptography
Emergency preparedness
Encryption
Intelligent agents
Interoperability
Management systems
Security
Security systems
Standardization
title Intelligent Management of the Cryptographic Keys
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T04%3A23%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intelligent%20Management%20of%20the%20Cryptographic%20Keys&rft.jtitle=International%20journal%20of%20computers,%20communications%20&%20control&rft.au=Moise,%20Gabriela&rft.date=2011-03-01&rft.volume=6&rft.issue=1&rft.spage=150&rft.pages=150-&rft.issn=1841-9836&rft.eissn=1841-9844&rft_id=info:doi/10.15837/ijccc.2011.1.2209&rft_dat=%3Cproquest%3E2518393678%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2518393678&rft_id=info:pmid/&rfr_iscdi=true