Actions for Key management for large scale end-to-end encryption [electronic resource].
Key management for large scale end-to-end encryption [electronic resource].
- Published
- Washington, D.C. : United States. Dept. of Energy, 1994.
Oak Ridge, Tenn. : Distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy. - Physical Description
- 7 pages : digital, PDF file
- Additional Creators
- Sandia National Laboratories, United States. Department of Energy, and United States. Department of Energy. Office of Scientific and Technical Information
Access Online
- Restrictions on Access
- Free-to-read Unrestricted online access
- Summary
- Symmetric end-to-end encryption requires separate keys for each pair of communicating confidants. This is a problem of Order N². Other factors, such as multiple sessions per pair of confidants and multiple encryption points in the ISO Reference Model complicate key management by linear factors. Public-key encryption can reduce the number of keys managed to a linear problem which is good for scaleability of key management, but comes with complicating issues and performance penalties. Authenticity is the primary ingredient of key management. If each potential pair of communicating confidants can authenticate data from each other, then any number of public encryption keys of any type can be communicated with requisite integrity. These public encryption keys can be used with the corresponding private keys to exchange symmetric cryptovariables for high data rate privacy protection. The Digital Signature Standard (DSS), which has been adopted by the United States Government, has both public and private components, similar to a public-key cryptosystem. The Digital Signature Algorithm of the DSS is intended for authenticity but not for secrecy. In this paper, the authors will show how the use of the Digital Signature Algorithm combined with both symmetric and asymmetric (public-key) encryption techniques can provide a practical solution to key management scaleability problems, by reducing the key management complexity to a problem of order N, without sacrificing the encryption speed necessary to operate in high performance networks.
- Report Numbers
- E 1.99:sand--94-1556c
E 1.99: conf-9410105--4
conf-9410105--4
sand--94-1556c - Subject(s)
- Other Subject(s)
- Note
- Published through SciTech Connect.
07/01/1994.
"sand--94-1556c"
" conf-9410105--4"
"DE94014284"
"GB0103012"
Institute of Electrical and Electronics Engineers international Carnahan conference on security technology,Albuquerque, NM (United States),12-14 Oct 1994.
Pierson, L.G.; Witzke, E.L. - Funding Information
- AC04-94AL85000
View MARC record | catkey: 14352457