Title :
Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryption
Author :
Lu, Wai-pai ; Sundareshan, M.K.
Author_Institution :
AT&T Bell Labs., Holmdel, NJ, USA
fDate :
10/1/1989 12:00:00 AM
Abstract :
A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementation simplicity. A formal verification of the security of the resulting system in the sense of protecting the privacy of privileged information is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of other existing key management schemes
Keywords :
cryptography; protocols; combinatory logic principles; cryptography; end-to-end encryption; formal verification; internet environments; key management; network specific protocols; Authentication; Communication system control; Formal verification; Information security; Internet; Network servers; Privacy; Protection; Protocols; Web server;
Journal_Title :
Communications, IEEE Transactions on