[1]陈亚东,张涛,曾荣,等.密钥管理系统研究与实现[J].计算机技术与发展,2014,24(02):156-159.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Research and Implementation of Key Management System[J].,2014,24(02):156-159.
点击复制

密钥管理系统研究与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年02期
页码:
156-159
栏目:
安全与防范
出版日期:
2014-02-28

文章信息/Info

Title:
Research and Implementation of Key Management System
文章编号:
1673-629X(2014)02-0156-04
作者:
陈亚东张涛曾荣费稼轩华晔叶云
中国电力科学研究院
Author(s):
CHEN Ya-dongZHANG TaoZENG RongFEI Jia-xuanHUA YeYE Yun
关键词:
密码技术密钥管理非对称密钥对称密钥
Keywords:
cryptographic technologykey managementasymmetric keysymmetric key
分类号:
TP302.1
文献标志码:
A
摘要:
密码技术是信息安全问题的核心技术之一,密钥管理技术是密码技术的基础,在密钥的产生、存储、分配、更新、吊销、控制、销毁等密钥全生命周期过程中保证密钥的安全,保证对称密钥和非对称密钥的有效和安全管理,并提供高效、经济的密钥服务十分关键。文中从基础设施层到系统的管理层设计了将对称密钥和非对称密钥在整体上统一管理的密钥管理系统,实现了对密码设备的实时安全监控,可以作为一个独立提供对称密钥和非对称密钥全生命周期安全管理服务的密钥管理系统,也可以扩展作为数字证书发布系统的密钥管理系统后台。
Abstract:
Cryptographic technology is one of the core technologies of information security,which is basis of key management. To provide efficient and economic key service,it is of crucial importance to ensure the safety of secret key throughout the process of the whole life cycle includes system initialization,key generation,key encasement,key distribution,key storage,key renovation,key destruction,and to assure the effective and safety management of symmetric key and asymmetric key. Describe the design of key management system from the infrastructure layer to the management layer,the system provides real-time safety monitoring of cryptographic devices,key manage-ment system can be used as an independent with a symmetric key and asymmetric key lifecycle safety management services,also can be extended to be the key provider of CA (Certificate Authority) system.

相似文献/References:

[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
 SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(02):175.
[2]赵晓峰 叶震.几种数据库加密方法的研究与比较[J].计算机技术与发展,2007,(02):219.
 ZHAO Xiao-feng,YE Zhen.Research and Comparison of Several Database Encryption Technologies[J].,2007,(02):219.
[3]郑彦 王汝传 高冉 孙力娟.无线传感器网络中密钥管理机制约束因素研究[J].计算机技术与发展,2006,(10):118.
 ZHENG Yan,WANG Ru-chuan,GAO Ran,et al.Constrains of Key Management in Wireless Sensor Network[J].,2006,(02):118.
[4]张毅 肖四友.X-IDEA算法在手机图文信息安全传输中应用研究[J].计算机技术与发展,2012,(04):250.
 ZHANG Yi,XIAO Si-you.Study on Mobile Communication Image-Text Security Transport Based on X-IDEA Algorithm[J].,2012,(02):250.
[5]周林 矫文成 吴杨.卫星网络密钥管理仿真平台的设计及性能测试[J].计算机技术与发展,2012,(09):217.
 ZHOU Lin,JIAO Wen-cheng,WU Yang.Design and Performance Test of Key Management Simulation Platform of Satellite Network[J].,2012,(02):217.
[6]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148.
 ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(02):148.
[7]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
 LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(02):129.
[8]路士兵,朱麟,夏鑫.一种基于TPM的数据链系统密钥管理方案[J].计算机技术与发展,2019,29(04):87.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 018]
 LU Shi-bing,ZHU Lin,XIA Xin.A Key Management Scheme of Data Chain System Based on TPM[J].,2019,29(02):87.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 018]
[9]麻付强,徐 峥,苏振宇,等.一种基于 LDAP 的属性加密模型[J].计算机技术与发展,2023,33(06):147.[doi:10. 3969 / j. issn. 1673-629X. 2023. 06. 022]
 MA Fu-qiang,XU Zheng,SU Zhen-yu,et al.An Attribute-based Encryption Model with LDAP[J].,2023,33(02):147.[doi:10. 3969 / j. issn. 1673-629X. 2023. 06. 022]

更新日期/Last Update: 1900-01-01