ABSTRACT

If the doors of perception were cleansed everything would appear to man as it is, infinite.

William Blake (1757-1827) English Poet

A cryptographic scheme is only as strong as the security of its keys. This chapter is devoted to key management — the secure generation, distribution, and storage of keys. These are aspects of public key infrastructure — protocols, services, and standards — used in concert as an edifice to support secure publickey cryptography, which we will discuss in Section 8.3. However, we already have been introduced to a means of key recovery for digital cash schemes discussed in Section 7.3. Thus, we begin with a section that looks at more general such schemes to be used in public-key cryptosystems.