• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!
K

Kathleen Martin

Guest
1. Cryptography Key Management for IoT
Overview Cryptography Key Management for IoT
A good cryptographic Key Management System (KMS) should be able to handle all security-related IT operations from a central location. It is a process that should be established with data protection in mind, especially with sensitive data. The use of a cryptographic Key Management System must be superior to conventional password managers.
We divided protocols into three categories: distributed, decentralized, and centralized.
  • Distributed: Members of the group work together to create a shared session key.
  • Decentralized: To eliminate a single point of failure, the decentralized protocols employ a hierarchy of key controllers to distribute the encryption group key to all group members.
  • Centralized: To control the group and assign a group encryption key to each group member, a single entity known as the Key Distribution Center (KDC) is used.
 
Cryptographic models and security systems now in use are based on commonly used encryption algorithms and privacy standards.
  • Asymmetric cryptography: Elliptic Curve Cryptography (ECC) and Diffie-Hellman (DH).
p0006085.m05742.1_2.png
Continue reading: https://securityboulevard.com/2021/12/cryptography-key-management-authentication-and-authorization-for-iot/
 

Attachments

  • p0006085.m05741.security_boulevard_logo_1.png
    p0006085.m05741.security_boulevard_logo_1.png
    3.9 KB · Views: 32
  • Like
Reactions: Kathleen Martin