Key management

This is an old revision of this page, as edited by Ww (talk | contribs) at 23:27, 6 May 2004 (clarity). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In cryptography, key management includes all of the provisions made

which are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. There is a distinction between key management, which concerns keys at the users' level (ie, passed between systems or users or both), and key scheduling which is usually taken to apply to the handling of key material within the operation of a cypher algorithm.

Appropriate and successful key management is critical to the secure use of every crypto system without exception. It is, in actual practice, the most difficult aspect of cryptography generally, for it involves system policy, user training, organizational and departmantal interactions in many cases, coordination betwixt end users, etc.

Many of these concerns are not limited to cryptographic engineering and so are outside a strictly cryptographic brief, though of critical importance. As a result, some aspects of key management fall between two stools as the cryptographers may assume this or that aspect is the responsibility of the using department or upper management or some such, while said department or upper management regard it all as being outside their concerns because 'technical', and so within the purview of the cryptographers.