Abstract
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need to explicate key distribution protocols in a way that allows to understand which results they achieve and on which assumptions they depend. We define a modular system that can be used to transform cryptographic protocols into a generic form and that has proven to be useful in the analysis and the construction of such protocols.
Chapter PDF
References
ANSI X9.17-1985: Financial Institution Key Management (Wholesale), 1985.
ANSI X12.42-198x: EDI Security Structures and Cryptographic Service Message Transaction Set, 1989.
Bauspieß, F.; Knobloch, H.-J.: “How to Keep Authenticity Alive in a Computer Network”, Proceedings of Eurocrypt’89, Springer LNCS 434 (1990), 38–46.
Burrows, M.; Abadi, M.; Needham, R.: A Logic of Authentication, DEC System Research Center Report 39, 1990.
CCITT Draft Recommendation X.509: The Directory-Authentication Framework, 1987.
Diffie, W.; Hellman, M.E.: “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22 (1976), 644–654.
Günther, Ch.G.: “An Identity-Based Key-Exchange Protocol”, Proceedings of Eurocrypt’89, Springer LNCS 434 (1990), 29–37.
ISO 7498-2: Open Systems Interconnections-Part 2: Security Architecture, 1988.
IEC/ISO 9797: Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm, 1989.
IEC/ISO Committee Draft 9798-2: Entity Authentication Mechanisms-Part 2: Entity Authentication Using Symmetric Techniques, 1990.
IEC/ISO Committee Draft 9798-3: Entity Authentication Mechanisms-Part 3: Entity Authentication Using a Public-Key Algorithm, 1990.
IEC/ISO/JTC1/SC27/WG2 Working Draft: Key Management Part 2: Key Management Using Symmetric Cryptographic Techniques, 1990.
IEC/ISO/JTC1/SC27/WG2 Working Draft: Key Management Part 3: Key Management Using Public Key Techniques, 1990.
Koyama K.; Ohta, K.: “Identity-Based Conference Key Distribution Systems”, Proceedings of Crypto’87, Springer LNCS 293 (1988), 175–184.
Miller, S.P.; Neuman, C.; Schiller, J.I.; Saltzer, J.H.: Kerberos Authentication and Authorization System, Project Athena Technical Plan, MIT, 1987.
Needham, R.M.; Schroeder, M.D.: “Using Encryption for Authentication in Large Networks of Computers”, Communications of the ACM, 21 (1978), 993–999.
Okamoto, E.: “Proposal for Identity-Based Key Distribution Systems”, Electronic Letters, 22 (1986), 1283–1284.
Otway, D.; Rees, O.: “Efficient and Timely Mutual Authentication”, Operating Systems Review, 21 (1987), 8–10.
Rueppel, R.A.: “Key Agreements Based on Function Composition”, Proceedings of Eurocrypt’88, Springer LNCS 330 (1988), 3–10.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fumy, W., Munzert, M. (1991). A Modular Approach to Key Distribution. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_20
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive