DocumentCode
1549616
Title
Key derivation for network management applications
Author
Blumenthal, Uri ; Hien, Nguyen C. ; Wijnen, Bert
Author_Institution
IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
Volume
11
Issue
3
fYear
1997
Firstpage
26
Lastpage
29
Abstract
This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalized for network protocols and applications where several “masters” need to talk to a large number of “slaves”. It shows a way to cut down on the amount of keys stored with little impact on security. This is especially important when human users are involved
Keywords
cryptography; telecommunication network management; transport protocols; SNMP; Simple Network Management Protocol; TCP/IP; Transmission Control Protocol/Internet Protocol; key derivation method; key distribution; masters; network management applications; network protocols; security; slaves; symmetric key cryptography; Computer network management; Computer networks; Computerized monitoring; Cryptography; Data mining; Humans; Protocols; Remote monitoring; Telecommunication traffic; Terminology;
fLanguage
English
Journal_Title
Network, IEEE
Publisher
ieee
ISSN
0890-8044
Type
jour
DOI
10.1109/65.587046
Filename
587046
Link To Document