Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Key management

Index Key management

Key management refers to management of cryptographic keys in a cryptosystem. [1]

62 relations: AppViewX, Block cipher, Book cipher, Certificate authority, Crypto-shredding, Cryptographic protocol, Cryptography, Cryptomathic, Cryptosystem, Diffie–Hellman key exchange, Diplomatic bag, Dynamic secrets, Electronic Key Management System, Enigma machine, European Rail Traffic Management System, European Train Control System, Futurex, General Data Protection Regulation, German Army (Wehrmacht), Glossary of cryptographic keys, Hardware security, Hash function, HashiCorp, Health Insurance Portability and Accountability Act, Information privacy, Key (cryptography), Key (lock), Key ceremony, Key derivation function, Key distribution center, Key encapsulation, Key generation, Key Management Interoperability Protocol (KMIP), Key schedule, Key server (cryptographic), Key Wrap, Keystore, KSD-64, Multicast, National Institute of Standards and Technology, National Security Agency, OASIS (organization), Over-the-air rekeying, Payment Card Industry Data Security Standard, Plaintext, Point of sale, Pretty Good Privacy, PrivacyIDEA, Pseudorandom function family, Public key certificate, ..., Public key infrastructure, Public-key cryptography, QuintessenceLabs, Regulatory compliance, Richard Sorge, Sarbanes–Oxley Act, Smart card, SSH Communications Security, Symmetric-key algorithm, Transport Layer Security, Venafi, Vormetric. Expand index (12 more) »

AppViewX

AppViewX is Payoda Technologies' network infrastructure management solution catering to the needs of enterprises that have invested heavily in data centres and require an agile network management solution.

New!!: Key management and AppViewX · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Key management and Block cipher · See more »

Book cipher

A book cipher is a cipher in which the key is some aspect of a book or other piece of text.

New!!: Key management and Book cipher · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: Key management and Certificate authority · See more »

Crypto-shredding

Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys.

New!!: Key management and Crypto-shredding · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

New!!: Key management and Cryptographic protocol · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Key management and Cryptography · See more »

Cryptomathic

Cryptomathic is a software company specializing in the area of cryptography for e-commerce security systems.

New!!: Key management and Cryptomathic · See more »

Cryptosystem

In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).

New!!: Key management and Cryptosystem · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: Key management and Diffie–Hellman key exchange · See more »

Diplomatic bag

A diplomatic bag, also known as a diplomatic pouch, is a container with certain legal protections used for carrying official correspondence or other items between a diplomatic mission and its home government or other diplomatic, consular, or otherwise official entity.

New!!: Key management and Diplomatic bag · See more »

Dynamic secrets

Dynamic Secrets is a novel key management scheme for secure communications.

New!!: Key management and Dynamic secrets · See more »

Electronic Key Management System

The Electronic Key Management System (EKMS) system is a United States National Security Agency led program responsible for Communications Security (COMSEC) key management, accounting, and distribution.

New!!: Key management and Electronic Key Management System · See more »

Enigma machine

The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication.

New!!: Key management and Enigma machine · See more »

European Rail Traffic Management System

The European Rail Traffic Management System (ERTMS) is the system of standards for management and interoperation of signalling for railways by the European Union (EU).

New!!: Key management and European Rail Traffic Management System · See more »

European Train Control System

The European Train Control System (ETCS) is the signalling and control component of the European Rail Traffic Management System (ERTMS).

New!!: Key management and European Train Control System · See more »

Futurex

Futurex LP, commonly referred to as Futurex, is a privately held Texas-based information technology company specialized in cryptography.

New!!: Key management and Futurex · See more »

General Data Protection Regulation

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).

New!!: Key management and General Data Protection Regulation · See more »

German Army (Wehrmacht)

The German Army (Heer) was the land forces component of the Wehrmacht, the regular German Armed Forces, from 1935 until it was demobilized and later dissolved in August 1946.

New!!: Key management and German Army (Wehrmacht) · See more »

Glossary of cryptographic keys

This glossary lists types of keys as the term is used in cryptography, as opposed to door locks.

New!!: Key management and Glossary of cryptographic keys · See more »

Hardware security

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.

New!!: Key management and Hardware security · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: Key management and Hash function · See more »

HashiCorp

HashiCorp is an open-source software company based in San Francisco, California.

New!!: Key management and HashiCorp · See more »

Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.

New!!: Key management and Health Insurance Portability and Accountability Act · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: Key management and Information privacy · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Key management and Key (cryptography) · See more »

Key (lock)

A key is a device that is used to operate a lock (such as to lock or unlock it).

New!!: Key management and Key (lock) · See more »

Key ceremony

In public-key cryptography and computer security, a root key ceremony is a procedure where a unique pair of public and private root keys is generated.

New!!: Key management and Key ceremony · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Key management and Key derivation function · See more »

Key distribution center

In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys.

New!!: Key management and Key distribution center · See more »

Key encapsulation

Key encapsulation mechanisms (KEMs) are a class of encryption techniques designed to secure symmetric cryptographic key material for transmission using asymmetric (public-key) algorithms.

New!!: Key management and Key encapsulation · See more »

Key generation

Key generation is the process of generating keys in cryptography.

New!!: Key management and Key generation · See more »

Key Management Interoperability Protocol (KMIP)

The Key Management Interoperability Protocol (KMIP) is an extensible communication protocol that defines message formats for the manipulation of cryptographic keys on a key management server.

New!!: Key management and Key Management Interoperability Protocol (KMIP) · See more »

Key schedule

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds.

New!!: Key management and Key schedule · See more »

Key server (cryptographic)

In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs.

New!!: Key management and Key server (cryptographic) · See more »

Key Wrap

Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material.

New!!: Key management and Key Wrap · See more »

Keystore

A Java KeyStore (JKS) is a repository of security certificates either authorization certificates or public key certificates plus corresponding private keys, used for instance in SSL encryption.

New!!: Key management and Keystore · See more »

KSD-64

The KSD-64 Crypto Ignition Key (CIK) is an NSA-developed EEPROM chip packed in a plastic case that looks like a toy key.

New!!: Key management and KSD-64 · See more »

Multicast

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.

New!!: Key management and Multicast · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Key management and National Institute of Standards and Technology · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Key management and National Security Agency · See more »

OASIS (organization)

The Organization for the Advancement of Structured Information Standards (OASIS) is a global nonprofit consortium that works on the development, convergence, and adoption of standards for security, Internet of Things, energy, content technologies, emergency management, and other areas.

New!!: Key management and OASIS (organization) · See more »

Over-the-air rekeying

Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels (“over the air”).

New!!: Key management and Over-the-air rekeying · See more »

Payment Card Industry Data Security Standard

Ebt can pin card number 5077190291713960 The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.

New!!: Key management and Payment Card Industry Data Security Standard · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Key management and Plaintext · See more »

Point of sale

The point of sale (POS) or point of purchase (POP) is the time and place where a retail transaction is completed.

New!!: Key management and Point of sale · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Key management and Pretty Good Privacy · See more »

PrivacyIDEA

privacyIDEA is a Two Factor Authentication System which is multi-tenency- and multi-instance-capable.

New!!: Key management and PrivacyIDEA · See more »

Pseudorandom function family

In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in the following way: no efficient algorithm can distinguish (with significant advantage) between a function chosen randomly from the PRF family and a random oracle (a function whose outputs are fixed completely at random).

New!!: Key management and Pseudorandom function family · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: Key management and Public key certificate · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Key management and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Key management and Public-key cryptography · See more »

QuintessenceLabs

QuintessenceLabs Pty Ltd. (or QuintessenceLabs) is a cybersecurity company headquartered in Canberra, Australia with offices in San Jose, California.

New!!: Key management and QuintessenceLabs · See more »

Regulatory compliance

In general, compliance means conforming to a rule, such as a specification, policy, standard or law.

New!!: Key management and Regulatory compliance · See more »

Richard Sorge

Richard Sorge (October 4, 1895 – November 7, 1944) was a Soviet military intelligence officer, active before and during World War II, working as an undercover German journalist in both Nazi Germany and the Empire of Japan.

New!!: Key management and Richard Sorge · See more »

Sarbanes–Oxley Act

The Sarbanes–Oxley Act of 2002, also known as the "Public Company Accounting Reform and Investor Protection Act" (in the Senate) and "Corporate and Auditing Accountability, Responsibility, and Transparency Act" (in the House) and more commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms.

New!!: Key management and Sarbanes–Oxley Act · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Key management and Smart card · See more »

SSH Communications Security

SSH Communications Security Corp. is a cybersecurity company focusing on encryption and access control solutions to help its customers meet compliance requirements, improve their security posture, and save on operational costs.

New!!: Key management and SSH Communications Security · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Key management and Symmetric-key algorithm · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Key management and Transport Layer Security · See more »

Venafi

Venafi, Inc. is a privately held cybersecurity company that develops software to secure and protect cryptographic keys and digital certificates.

New!!: Key management and Venafi · See more »

Vormetric

Vormetric, Inc. was a private data security company headquartered in San Jose, California, United States that provided products and services to prevent sensitive data theft from hackers and malicious insiders by securing structured data in databases and unstructured data located in file systems.

New!!: Key management and Vormetric · See more »

Redirects here:

Key Management Solution, Key management protocol, Key management system, List of open-source key management systems, Symmetric Key Management(Key Derivation and Key Wrap), Symmetric key management.

References

[1] https://en.wikipedia.org/wiki/Key_management

OutgoingIncoming
Hey! We are on Facebook now! »