Loading…
Intelligent Management of the Cryptographic Keys
With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be eith...
Saved in:
Published in: | International journal of computers, communications & control communications & control, 2011-03, Vol.6 (1), p.150 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 1 |
container_start_page | 150 |
container_title | International journal of computers, communications & control |
container_volume | 6 |
creator | Moise, Gabriela Cangea, Otilia |
description | With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage. |
doi_str_mv | 10.15837/ijccc.2011.1.2209 |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2518393678</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2518393678</sourcerecordid><originalsourceid>FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003</originalsourceid><addsrcrecordid>eNo9jstOwzAURC0EElXpD7CKxDrB9_q9RBGPiiI2sK4c20kThSTE7qJ_TxAVs5mzOjOE3AItQGim7tvOOVcgBSigQKTmgqxAc8iN5vzyn5m8JpsYO7qEoaZKrAjdDin0fduEIWVvdrBN-PrFsc7SIWTlfJrS2Mx2OrQuew2neEOuatvHsDn3mnw-PX6UL_nu_XlbPuxyhyhTjkzLELzlTEgvkFtTV15CQO-U4lQoZTVIo6pKoJShBoGqoh6Y8Yyy5d-a3P15p3n8PoaY9t14nIdlco8CNDNMKs1-AD-ERlM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2518393678</pqid></control><display><type>article</type><title>Intelligent Management of the Cryptographic Keys</title><source>Publicly Available Content Database</source><creator>Moise, Gabriela ; Cangea, Otilia</creator><creatorcontrib>Moise, Gabriela ; Cangea, Otilia</creatorcontrib><description>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</description><identifier>ISSN: 1841-9836</identifier><identifier>EISSN: 1841-9844</identifier><identifier>DOI: 10.15837/ijccc.2011.1.2209</identifier><language>eng</language><publisher>Oradea: Agora University of Oradea</publisher><subject>Algorithms ; Computers ; Cryptography ; Emergency preparedness ; Encryption ; Intelligent agents ; Interoperability ; Management systems ; Security ; Security systems ; Standardization</subject><ispartof>International journal of computers, communications & control, 2011-03, Vol.6 (1), p.150</ispartof><rights>2011. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2518393678?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Moise, Gabriela</creatorcontrib><creatorcontrib>Cangea, Otilia</creatorcontrib><title>Intelligent Management of the Cryptographic Keys</title><title>International journal of computers, communications & control</title><description>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</description><subject>Algorithms</subject><subject>Computers</subject><subject>Cryptography</subject><subject>Emergency preparedness</subject><subject>Encryption</subject><subject>Intelligent agents</subject><subject>Interoperability</subject><subject>Management systems</subject><subject>Security</subject><subject>Security systems</subject><subject>Standardization</subject><issn>1841-9836</issn><issn>1841-9844</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNo9jstOwzAURC0EElXpD7CKxDrB9_q9RBGPiiI2sK4c20kThSTE7qJ_TxAVs5mzOjOE3AItQGim7tvOOVcgBSigQKTmgqxAc8iN5vzyn5m8JpsYO7qEoaZKrAjdDin0fduEIWVvdrBN-PrFsc7SIWTlfJrS2Mx2OrQuew2neEOuatvHsDn3mnw-PX6UL_nu_XlbPuxyhyhTjkzLELzlTEgvkFtTV15CQO-U4lQoZTVIo6pKoJShBoGqoh6Y8Yyy5d-a3P15p3n8PoaY9t14nIdlco8CNDNMKs1-AD-ERlM</recordid><startdate>20110301</startdate><enddate>20110301</enddate><creator>Moise, Gabriela</creator><creator>Cangea, Otilia</creator><general>Agora University of Oradea</general><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20110301</creationdate><title>Intelligent Management of the Cryptographic Keys</title><author>Moise, Gabriela ; Cangea, Otilia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>Computers</topic><topic>Cryptography</topic><topic>Emergency preparedness</topic><topic>Encryption</topic><topic>Intelligent agents</topic><topic>Interoperability</topic><topic>Management systems</topic><topic>Security</topic><topic>Security systems</topic><topic>Standardization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Moise, Gabriela</creatorcontrib><creatorcontrib>Cangea, Otilia</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>International journal of computers, communications & control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Moise, Gabriela</au><au>Cangea, Otilia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intelligent Management of the Cryptographic Keys</atitle><jtitle>International journal of computers, communications & control</jtitle><date>2011-03-01</date><risdate>2011</risdate><volume>6</volume><issue>1</issue><spage>150</spage><pages>150-</pages><issn>1841-9836</issn><eissn>1841-9844</eissn><abstract>With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.</abstract><cop>Oradea</cop><pub>Agora University of Oradea</pub><doi>10.15837/ijccc.2011.1.2209</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1841-9836 |
ispartof | International journal of computers, communications & control, 2011-03, Vol.6 (1), p.150 |
issn | 1841-9836 1841-9844 |
language | eng |
recordid | cdi_proquest_journals_2518393678 |
source | Publicly Available Content Database |
subjects | Algorithms Computers Cryptography Emergency preparedness Encryption Intelligent agents Interoperability Management systems Security Security systems Standardization |
title | Intelligent Management of the Cryptographic Keys |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T04%3A23%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intelligent%20Management%20of%20the%20Cryptographic%20Keys&rft.jtitle=International%20journal%20of%20computers,%20communications%20&%20control&rft.au=Moise,%20Gabriela&rft.date=2011-03-01&rft.volume=6&rft.issue=1&rft.spage=150&rft.pages=150-&rft.issn=1841-9836&rft.eissn=1841-9844&rft_id=info:doi/10.15837/ijccc.2011.1.2209&rft_dat=%3Cproquest%3E2518393678%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c226t-2386eeda4356d524a9fbd61e2dc7740577a81697bb5266ef1527b0d139d303003%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2518393678&rft_id=info:pmid/&rfr_iscdi=true |