ABSTRACT

This chapter addresses the encryption which offers reasonable protection at low cost of ownership provided appropriate key distribution schemes are implemented and that the resulting management issues. One of the most significant factors in a key management scheme is the method by which data keys are provided to each of the encryption devices. In-line encryption has a number of advantages while also satisfying a number of the security requirements. The list of controls required over encryption equipment shows clearly the need for some form of remote management. The ease of interfacing is a significant factor in the justification of in-line type devices as existing communications links can be broken at a suitable standard protocol interface and the units inserted. All of the rationale that justifies central management of communications equipment is applicable to encryption devices, and in some cases more so.