Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack both symmetric and public key cryptosystems through their key management. We introduce a protocol to exchange cipher keys over insecure communication channel. This protocol is based on public key cryptosystem, especially elliptic curve cryptosystem. Meanwhile, it tests the cipher keys and selects only the good keys and rejects the weak one.
Fahmy, A. (2011). NEW PROPOSAL FOR KEY MANAGEMENT. International Conference on Aerospace Sciences and Aviation Technology, 11(ASAT Conference, 17-19 May 2005), 725-730. doi: 10.21608/asat.2011.27181
MLA
Alaa Fahmy. "NEW PROPOSAL FOR KEY MANAGEMENT", International Conference on Aerospace Sciences and Aviation Technology, 11, ASAT Conference, 17-19 May 2005, 2011, 725-730. doi: 10.21608/asat.2011.27181
HARVARD
Fahmy, A. (2011). 'NEW PROPOSAL FOR KEY MANAGEMENT', International Conference on Aerospace Sciences and Aviation Technology, 11(ASAT Conference, 17-19 May 2005), pp. 725-730. doi: 10.21608/asat.2011.27181
VANCOUVER
Fahmy, A. NEW PROPOSAL FOR KEY MANAGEMENT. International Conference on Aerospace Sciences and Aviation Technology, 2011; 11(ASAT Conference, 17-19 May 2005): 725-730. doi: 10.21608/asat.2011.27181