Abstract
This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used. The ultimate goal is to provide the entities a means to agree either on a mutually acceptable KRM or on different, yet interoperable, mechanisms of their choice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Balenson, D., Markham, T.: ISAKMP key recovery extensions. Computers & Security, 19(1) (2000) 91–99.
Denning, D.E.: Information Warfare and Security. Addison Wesley, (1998).
Denning, D.E., Branstad, D.K.: A taxonomy of key escrow encryption systems. Communications of the ACM, 39(3) (1996) 34–40.
Dierks, T., Allen, C.: The TLS protocol, Version 1.0. RFC 2246 (1999).
Gupta, S.: A common key recovery block format: Promoting interoperability between dissimilar key recovery mechanisms. Computers & Security, 19(1) (2000) 41–47.
Kennedy, J., Matyas Jr., S.M., Zunic, N.: Key recovery functional model. Computers & Security, 19(1) (2000) 31–36.
Maughan, D., Schertler, M., Turner, J.: Internet security association and key management protocol (ISAKMP). RFC 2408.
National Institute of Standards and Technology: Requirements for key recovery products. Available at http://www.csrc.nist.gov/keyrecovery/ (1998).
Rantos, K., Mitchell, C.: Remarks on KRA’s key recovery block format. Electronics Letters, 35 (1999) 632–634.
Smith, M., van Oorschot, P., Willett, M.: Cryptographic information recovery using key recovery. Computers & Security, 19(1) (2000) 21–27.
Williams, C., Zunic, N.: Global interoperability for key recovery. Computers & Security, 19(1) (2000) 48–55.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rantos, K., Mitchell, C.J. (2001). Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_23
Download citation
DOI: https://doi.org/10.1007/3-540-45325-3_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43026-1
Online ISBN: 978-3-540-45325-3
eBook Packages: Springer Book Archive