Title: An Information Security Framework Addressing the Initial Cryptographic Key Authentication Challenges
Abstract: The top-down information security framework uses a governing definition of information security and lists the security services in order to define authentication. At a lower level of abstraction, the cryptographic mechanisms are discussed, with a reminder that key management schemes (including the PKI) eventually revert to non-cryptographic means for cryptographic association establishment. Our framework introduces the SAKEM procedure (Secret Authentication Key Establishment Method), a unique scheme for providing secret key authentication precisely where an out-of-band secret key distribution would otherwise occur, when a credential service provider enrolls a new subscriber.
Publication Year: 2004
Publication Date: 2004-01-01
Language: en
Type: article
Access and Citation
Cited By Count: 2
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot