Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Encrypting Keys Securely

Published: 01 July 2010 Publication History

Abstract

Encryption keys are sometimes encrypted themselves; doing that properly requires special care. Although it might look like an oversight at first, the broadly accepted formal security definitions for cryptosystems don't allow encryption of key-dependent messages. Furthermore, key-management systems frequently use key encryption or wrapping, which might create dependencies among keys that lead to problems with simple access-control checks. Security professionals should be aware of this risk and take appropriate measures. Novel cryptosystems offer protection for key-dependent messages and should be considered for practical use. Through enhanced access control in key-management systems, you can prevent security-interface attacks.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 8, Issue 4
July 2010
84 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 July 2010

Author Tags

  1. CCA2 security
  2. access control
  3. cryptography
  4. key encryption
  5. key encryption, cryptography, security and privacy, semantic security, CCA2 security, key management, access control
  6. key management
  7. security and privacy
  8. semantic security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media