Overview#
Key Management refers to the establishment of Cryptographic Key material for use with a Cryptographic algorithm to provide protocol security services, especially integrity, authentication, and confidentiality.Key Management is the management of Cryptographic Keys in a cryptography.
Key Management includes dealing with the:
- Key Generation
- Key-Exchange
- Keystore
- Key Usage
- Key Verification
- Key Rotation
- Key Revocation
- Key Deletion
Key Management includes Cryptography protocol design.
Key Management is the more challenging side of cryptography in a sense that it involves aspects of Social Engineering such as system policy, user training, organizational and departmental interactions and coordination between all of these elements, in contrast to pure mathematical practices that can be automated.
Best Current Practice BCP 107 is the #
Best Current Practice BCP 107 is Guidelines for Cryptographic Key ManagementKey Management Service#
Is a Key Management ServiceKey Management Examples#
- Public Key Infrastructure (PKI)
- Decentralized Public Key Infrastructure (DPKI) (also called Decentralized Key Management System DKMS)
Key Life cycle#
A key is used differently, depending upon its state in the key’s lifecycle. Key states are defined from a system point-of-view, as opposed to the point-of-view of a single cryptographic module.Key Life cycle is the Key Management of the state of a Key as it transitions through the various states of the Life cycle.
More Information#
There might be more information for this subject on one of the following:- BCP 107
- Cryptographic Key
- Decentralized Public Key Infrastructure
- Double Ratchet Algorithm
- Extensible Authentication Protocol
- Faythe
- Google Cloud Security
- Google Key Management Service
- Key Life cycle
- Key Management Service
- Key Revocation
- NICI
- NIST.SP.800-57
- RFC 5247
- W3C Decentralized Identifiers
- [#1] - Key_management
- based on information obtained 2017-08-01-