• DocumentCode
    1549616
  • Title

    Key derivation for network management applications

  • Author

    Blumenthal, Uri ; Hien, Nguyen C. ; Wijnen, Bert

  • Author_Institution
    IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
  • Volume
    11
  • Issue
    3
  • fYear
    1997
  • Firstpage
    26
  • Lastpage
    29
  • Abstract
    This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalized for network protocols and applications where several “masters” need to talk to a large number of “slaves”. It shows a way to cut down on the amount of keys stored with little impact on security. This is especially important when human users are involved
  • Keywords
    cryptography; telecommunication network management; transport protocols; SNMP; Simple Network Management Protocol; TCP/IP; Transmission Control Protocol/Internet Protocol; key derivation method; key distribution; masters; network management applications; network protocols; security; slaves; symmetric key cryptography; Computer network management; Computer networks; Computerized monitoring; Cryptography; Data mining; Humans; Protocols; Remote monitoring; Telecommunication traffic; Terminology;
  • fLanguage
    English
  • Journal_Title
    Network, IEEE
  • Publisher
    ieee
  • ISSN
    0890-8044
  • Type

    jour

  • DOI
    10.1109/65.587046
  • Filename
    587046