Cryptographic Key Protection in a Cryptoprocessor
详细信息    查看全文
文摘
Key management encompasses protocols related to generation, distribution, establishment and revocation of keys and subsequent protection of keys during storage and while in use. Hardware Security Module (HSM) is used for this purpose which adheres to standards such as FIPS 140-2 or IBM Common Criteria. Hardware tokens primarily serve to transport the keys to an unprotected environment. In this paper we introduce challenges to key management and propose approaches for key management in a cryptoprocessor. Advanced Encryption Standard Key Wrap algorithm which is one of the most widely used method for key protection in field programmable gate arrays (FPGAs) is also considered.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700