Cryptographic key recovery

被引:3
|
作者
AlSalqan, YY
机构
关键词
D O I
10.1109/FTDCS.1997.644700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet/Intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach the expected potential. Security can be achieved via encryption. Encryption uses ''keys'' to encrypt and decrypt the information. Without having the cryptographic key, the ciphered information will never be converted into its original text. In case of key loss or damage or forgetting the key password; there should be a mechanism to recover the cryptographic keys and decipher the encrypted information. This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data. The mechanism does not require keys to be escrowed. It is based on adding an extra, small, field - Key Recovery Entry (KRE) to a message or file being transmitted. This mechanism facilitates key recovery for both session-keys in symmetric cryptographic system, and private keys in the asymmetric cryptographic systems without any need to escrow any key information. The author makes the differentiation between key escrow and key recovery.
引用
收藏
页码:34 / 37
页数:4
相关论文
共 50 条
  • [1] Cryptographic information recovery using key recovery
    Smith, M
    VanOorschot, P
    Willett, M
    COMPUTERS & SECURITY, 2000, 19 (01) : 21 - 27
  • [2] Two-phase cryptographic key recovery system
    Gennaro, R
    Karger, P
    Matyas, S
    Peyravian, M
    Roginsky, A
    Safford, D
    Willett, M
    Zunic, N
    COMPUTERS & SECURITY, 1997, 16 (06) : 481 - 506
  • [3] Modeling of multiple agent based cryptographic key recovery protocol
    Lim, SY
    Kang, SS
    Sohn, JC
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 119 - 128
  • [4] A Secure Multiple-Agent Cryptographic Key Recovery System
    Kanyamee, Kanokwan
    Sathitwiriyawong, Chanboon
    PROCEEDINGS OF THE 2009 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 91 - 96
  • [5] Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions
    Miandoab, Dina Ghanai
    Garrett, Michael Logan
    Alam, Mahafujul
    Jain, Saloni
    Assiri, Sareh
    Cambou, Bertrand
    APPLIED SCIENCES-BASEL, 2025, 15 (05):
  • [6] High-Availability Decentralized Cryptographic Multi-Agent Key Recovery
    Kanyamee, Kanokwan
    Sathitwiriyawong, Chanboon
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (01) : 52 - 58
  • [7] Selecting Cryptographic Key Sizes
    Arjen K. Lenstra
    Eric R. Verheul
    Journal of Cryptology, 2001, 14 : 255 - 293
  • [8] Cryptographic key management for the masses
    Potter, Bruce
    Network Security, 2006, 2006 (12) : 13 - 14
  • [9] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [10] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205