13.2 Crypto Keys on a Network

Key management has always posed a challenge for communications networks. Military and intelligence organizations spent much of the 20th century trying out different strategies and discovering their strengths and weaknesses.

Key management comes down to two problems:

  1. Ensure that the right people have the right crypto keys

  2. Prevent the wrong people from uncovering any crypto keys

It is hard to keep these in balance. An example of this made headlines in late 2009. The Predator drones used by the U.S. military to observe battlefield targets remotely were being monitored by opposing militias. Anyone who could afford the inexpensive software could intercept and watch a drone’s video feed. This allowed militias to ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.