Chapter 10. Key Management
VALENTINE: Why then, I would resort to her by night.DUKE: Ay, but the doors be lock'd and keys kept safe,That no man hath recourse to her by night. VALENTINE: What lets but one may enter at her window? | ||
--The Two Gentlemen of Verona, III, i, 110–113. |
Key management refers to the distribution of cryptographic keys; the mechanisms used to bind an identity to a key; and the generation, maintenance, and revoking of such keys. We assume that identities correctly define principals—that is, a key bound to the identity “Bob” is really Bob's key. Alice did not impersonate Bob's identity to obtain it. Chapter 14, “Representing Identity,” discusses the problem of identifiers naming principals; Chapter 12, “Authentication,” discusses ...
Get Computer Security: Art and Science now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.