Abstract:
Key management is the security core of cryptosystem; it will inevitably be the focus of attacks by adversary. This requires key management system with self-diagnosis, rehabilitation and reconstruction of the self-adaptive intrusion resilient capabilities. This paper presents a time-based intrusion resilient key management issue, with emphasis to consider the application of various types of keys (public key, private key, sub-key, key chain, etc.) changing over time, evolutionary algorithm, protocol design, and make the cryptographic system safer and more effective to better protect the security of cipher-based application technology. The research contents are analyzed in four areas: the basic key management model of time-based intrusion resilient key management, a forward-secure signature key evolution, proactive secret sharing scheme of the sub-key evolution, efficient self-healing capability with time-varying key generation and distribution. Some specific key issues and technical routes for further research on these contents are proposed.