Interpretative key management framework (IKM)
Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framewor...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utm.my/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf |
_version_ | 1796855010926002176 |
---|---|
author | Chaeikar, Saman Shojae |
author_facet | Chaeikar, Saman Shojae |
author_sort | Chaeikar, Saman Shojae |
collection | ePrints |
description | Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call. |
first_indexed | 2024-03-05T18:22:22Z |
format | Thesis |
id | utm.eprints-12074 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T18:22:22Z |
publishDate | 2010 |
record_format | dspace |
spelling | utm.eprints-120742018-05-30T02:49:19Z http://eprints.utm.my/12074/ Interpretative key management framework (IKM) Chaeikar, Saman Shojae QA75 Electronic computers. Computer science Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call. 2010-04 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf Chaeikar, Saman Shojae (2010) Interpretative key management framework (IKM). Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems. |
spellingShingle | QA75 Electronic computers. Computer science Chaeikar, Saman Shojae Interpretative key management framework (IKM) |
title | Interpretative key management framework (IKM) |
title_full | Interpretative key management framework (IKM) |
title_fullStr | Interpretative key management framework (IKM) |
title_full_unstemmed | Interpretative key management framework (IKM) |
title_short | Interpretative key management framework (IKM) |
title_sort | interpretative key management framework ikm |
topic | QA75 Electronic computers. Computer science |
url | http://eprints.utm.my/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf |
work_keys_str_mv | AT chaeikarsamanshojae interpretativekeymanagementframeworkikm |