Chapter 11
Key Management
VALENTINE: Why then, I would resort to her by night.
DUKE: Ay, but the doors be lock’d and keys kept safe, That no man hath recourse to her by night.
VALENTINE: What lets but one may enter at her window?
— The Two Gentlemen of Verona, III, i, 110–113.
Key management refers to the distribution of cryptographic keys; the mechanisms used to bind an identity to a key; and the generation, maintenance, and revoking of such keys. We assume that identities correctly define principals—that is, a key bound to the identity “Bob” is really Bob’s key. Alice did not impersonate Bob’s identity to obtain it. Chapter 15, “Representing Identity,” discusses the problem of identifiers naming principals; Chapter 13, “Authentication,” discusses ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access