4107: Guidelines for Cryptographic Key Management.

HTML TXT PS PDF
The question often arises of whether a given security system requires some form of automated key management, or whether manual keying is sufficient. This memo provides guidelines for making such decisions. When symmetric cryptographic mechanisms are used in a protocol, the presumption is that automated key management is generally but not always needed. If manual keying is proposed, the burden of proving that automated key management is not required falls to the proposer.
Status BEST CURRENT PRACTICE
Format TXT=14752 bytes
Also ['BCP0107']
Authors R. Housley
Date June 2005
Keyphrases key management manual key automated key management Cryptographic

References

Referenced by