ABSTRACT

This chapter provides details regarding symmetric keys, asymmetric key pairs, and public key certificates. The information presented in the chapter remains largely algorithm agnostic, but some algorithm specifics are referenced where needed. The chapter discusses some public key infrastructure (PKI) components. It also discusses the key management methods that are used in various protocols. The chapter discusses the key management schemes that address both data in transition between a sender and a receiver, and data in storage such as a database environment. It explains the DUKPT example for securely transmitting a PIN from a terminal to a host. The chapter discusses several symmetric-based key establish schemes, key delivery schemes, and asymmetric-based cryptographic schemes. It also addresses key establishment, a general term for key transport and key agreement methods. Various asymmetric cryptographic schemes are used to establish symmetric keys which in turn are used to protect data.