Title :
Injecting trust to cryptographic Key Management
Author :
Bal, Gökhan ; Schmidt, Andreas U. ; Kuntze, Nicolai
Author_Institution :
Goethe-Univ., Frankfurt am Main
Abstract :
Not withstanding the adoption of strong cryptographic mechanisms, the anticipated degree of security in the protection and management of privacy sensitive data can only be achieved, if secret keys can be shielded adequately. In practice, most implementations are based on software tokens that shall guard the keys against eavesdropping. This fact alleviates the hardness of circumvention of used cryptographic protocols and with this the disclosure of secret keys. In this paper we propose a key management architecture which - based on the capabilities of trusted computing technology - will provide a higher level of security.
Keywords :
cryptographic protocols; data privacy; private key cryptography; telecommunication security; cryptographic key management; cryptographic protocol; data privacy; eavesdropping guard key; secret key; security scheme; software token; trusted computing technology; Application software; Computer architecture; Cryptography; Data privacy; Data security; Hardware; Information security; Programming profession; Protection; Technology management; Browser Security; Key Management; Trusted Computing;
Conference_Titel :
Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on
Conference_Location :
Phoenix Park
Print_ISBN :
978-89-5519-138-7
Electronic_ISBN :
1738-9445