Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryption
- 1 January 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Communications
- Vol. 37 (10) , 1014-1023
- https://doi.org/10.1109/26.41153
Abstract
A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between authentication servers and/or control centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementation simplicity. A formal verification of the security of the resulting system in the sense of protecting the privacy of privileged information is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of other existing key management schemes. >Keywords
This publication has 13 references indexed in Scilit:
- On the Decomposition of Large Communication Networks for Hierarchical Control ImplementationIEEE Transactions on Communications, 1986
- Formal Verification of a Secure Network with End-to-End EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- A key distribution protocol using event markersACM Transactions on Computer Systems, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Issues in packet-network interconnectionProceedings of the IEEE, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978
- Generation, distribution, and installation of cryptographic keysIBM Systems Journal, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976