Gestión de claves

Acrónimos: KMI

Ver:

·         Clave

·         Clave criptográfica

Administración de claves criptográficas

Conjunto de procesos y mecanismos que respaldan el establecimiento y mantenimiento de las claves, así como el reemplazo de claves anteriores por nuevas claves, según sea necesario.

http://es.pcisecuritystandards.org

Gestión de claves

Proceso de generación, almacenamiento, distribución y aplicación de claves criptográficas de acuerdo con una política de seguridad (ISO-8732, ISO-7498-2). [Ribagorda:1997]

Gestión de claves

Proceso que comprende la generación, distribución, almacenamiento, utilización, archivo y destrucción de las claves empleadas en un criptosistema. [CESID:1997]

Sistema nacional de Gestión de Claves

Proceso que controla de modo seguro los procedimientos que regulan la actuación del Algoritmo Nacional de Cifra. [CESID:1997]

gestión de claves

Generación, almacenamiento, distribución, supresión, archivo y aplicación de claves de acuerdo con una política de seguridad. [ISO-7498-2:1989]

(en) key management

The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and zeroization. [CNSSI_4009:2010]

(en) key management device

A unit that provides for secure electronic distribution of encryption keys to authorized users. [CNSSI_4009:2010]

(en) key management infrastructure (KMI)

All parts – computer hardware, firmware, software, and other equipment and its documentation; facilities that house the equipment and related functions; and companion standards, policies, procedures, and doctrine that form the system that manages and supports the ordering and delivery of cryptographic material and related information products and services to users. [CNSSI_4009:2010]

(en) key management

1a. (I) The process of handling keying material during its life cycle in a cryptographic system; and the supervision and control of that process. (See: key distribution, key escrow, keying material, public-key infrastructure.)

Usage: Usually understood to include ordering, generating, storing, archiving, escrowing, distributing, loading, destroying, auditing, and accounting for the material.

1b. (O) /NIST/ "The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs, counters) during the entire life cycle of the keys, including their generation, storage, distribution, entry and use, deletion or destruction, and archiving." [FP140, SP57]

2. (O) /OSIRM/ "The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy." [ISO-7498-2]

[RFC4949:2007]

(en) Key management

The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction. [NIST-SP800-57:2007]

(en) Key management archive

A function in the lifecycle of keying material; a repository containing keying material of historical interest. [NIST-SP800-57:2007]

(en) Key Management Policy

The Key Management Policy is a high-level statement of organizational key management policies that identifies high-level structure, responsibilities, governing standards and recommendations, organizational dependencies and other relationships, and security policies. [NIST-SP800-57:2007]

(en) Key Management Practices Statement

The Key Management Practices Statement is a document or set of documentation that describes in detail the organizational structure, responsible roles, and organization rules for the functions identified in the Key Management Policy. [NIST-SP800-57:2007]

(en) key management

the administration and use of the generation, registration, certification, deregistration, distribution, installation, storage, archiving, revocation, derivation and destruction of keying material in accordance with a security policy. [ISO-19790:2006]

(en) Key management

the activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and zeroization. [FIPS-140-2:2001]

(en) Key management

The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy. [ISO-7498-2:1989]

(en) Key Management:

In cryptography, it is the set of processes and mechanisms which support key establishment and maintenance, including replacing older keys with new keys as necessary.

https://www.pcisecuritystandards.org/security_standards/glossary.php

(fr) Gestion de clé cryptographique

L’ensemble des mécanismes et processus qui prennent en charge l’établissement et la maintenance des clés, notamment le remplacement d’anciennes clés par des nouvelles, le cas échéant.

http://fr.pcisecuritystandards.org/

(fr) gestion de clés

Production, stockage, distribution, suppression, archivage et application de clés conformément à la politique de sécurité. [ISO-7498-2:1989]

Temas relacionados

Términos