Loading [MathJax]/extensions/MathMenu.js
Encrypting Keys Securely | IEEE Journals & Magazine | IEEE Xplore

Encrypting Keys Securely


Abstract:

Encryption keys are sometimes encrypted themselves; doing that properly requires special care. Although it might look like an oversight at first, the broadly accepted for...Show More

Abstract:

Encryption keys are sometimes encrypted themselves; doing that properly requires special care. Although it might look like an oversight at first, the broadly accepted formal security definitions for cryptosystems don't allow encryption of key-dependent messages. Furthermore, key-management systems frequently use key encryption or wrapping, which might create dependencies among keys that lead to problems with simple access-control checks. Security professionals should be aware of this risk and take appropriate measures. Novel cryptosystems offer protection for key-dependent messages and should be considered for practical use. Through enhanced access control in key-management systems, you can prevent security-interface attacks.
Published in: IEEE Security & Privacy ( Volume: 8, Issue: 4, July-Aug. 2010)
Page(s): 66 - 69
Date of Publication: 26 July 2010

ISSN Information:

Citations are not available for this document.

Public-Key Encryption for Secret Keys

Modern cryptography is concerned with giving precise mathematical models of the security guarantees that a cryptosystem gives. Any new cryptosystem must come with strong mathematical evidence or even complete proof for its security.

Cites in Papers - |

Cites in Papers - IEEE (3)

Select All
1.
Ch. Rupa, T. R. Penamaluru, V. Srinivasa Rao, "Secure information dispatch through assailant distraction by cheating text", 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN), pp.1-5, 2015.
2.
Pedro Adão, Riccardo Focardi, Flaminia L. Luccio, "Type-Based Analysis of Generic Key Management APIs", 2013 IEEE 26th Computer Security Foundations Symposium, pp.97-111, 2013.
3.
Steve Kremer, Graham Steel, Bogdan Warinschi, "Security for Key Management Interfaces", 2011 IEEE 24th Computer Security Foundations Symposium, pp.266-280, 2011.

Cites in Papers - Other Publishers (4)

1.
Ch. Rupa, "A Novel Approach in Security Using Gyration Slab with Watermarking Technique", Journal of The Institution of Engineers (India): Series B, vol.97, no.3, pp.273, 2016.
2.
Ch. Rupa, "A Digital Image Steganography using Sierpinski Gasket Fractal and PLSB", Journal of The Institution of Engineers (India): Series B, vol.94, no.3, pp.147, 2013.
3.
Ch. Rupa, P. S. Avadhani, Advances in Computer Science, Engineering & Applications, vol.167, pp.703, 2012.
4.
Riccardo Focardi, Flaminia L. Luccio, Graham Steel, "An Introduction to Security API Analysis", Foundations of Security Analysis and Design VI, vol.6858, pp.35, 2011.
Contact IEEE to Subscribe

References

References is not available for this document.