A key management concept for the CTBT International Monitoring System Page: 1 of 10
This article is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided to Digital Library by the UNT Libraries Government Documents Department.
The following text was automatically extracted from the image on this page using optical character recognition software:
A KEY MANAGEMENT CONCEPT FOR THE
CTBT INTERNATIONAL MONITORING SYSTEM
Pres Herrington, Tim Draelos and Rick Craft, Sandia National Labs RE. E
Ernie Brickell, Yair Frankel, and Mark Silvestri, CertCoR
DOE Contract No. DE-AC04-94AL85000 JUL 2 S 1997
Sponsored by DOE
Cryptographic authentication (commonly referred to as "technical authentication" in Working
Group B) is an enabling technology which ensures the integrity of sensor data and security of
digital networks under various data security compromise scenarios. The use of cryptographic
authentication, however, implies the development of a key management infrastructure for
establishing trust in the generation and distribution of cryptographic keys. This paper proposes
security and operational requirements for a CTBT key management system and, furthermore,
presents a public key based solution satisfying the requirements. The key management system is
instantiated with trust distribution technologies similar to those currently implemented in
industrial public key infrastructures. A complete system solution is developed.
Key words: Authentication, Public Key, Key Management, Certificate, Certification Authority,
This report was prepared as an account of work sponsored by an agency of the United States
Government. Neither the United States Government nor any agency thereof, nor any of their
employees, makes any warranty, express or implied, or assumes any legal liability or responsi-
bility for the accuracy, completeness, or usefulness of any information, apparatus, product, or
process disclosed, or represents that its use would not infringe privately owned rights. Refer-
ence herein to any specific commercial product, process, or service by trade name, trademark,
manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recom-
mendation, or favoring by the United States Government or any agency thereof. The views
and opinions of authors expressed herein do not necessarily state or reflect those of the
United States Government or any agency thereof.
DISTRIBUTOR OF TIS DOCUMENT IS UNLIMITED
CertCo's help in this effort has been on a voluntary basis and no funding from DOE has been provided for this
Here’s what’s next.
This article can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Article.
Herrington, P.; Draelos, T.; Craft, R.; Brickell, E.; Frankel, Y. & Silvestri, M. A key management concept for the CTBT International Monitoring System, article, August 1, 1997; Albuquerque, New Mexico. (digital.library.unt.edu/ark:/67531/metadc697427/m1/1/: accessed November 16, 2018), University of North Texas Libraries, Digital Library, digital.library.unt.edu; crediting UNT Libraries Government Documents Department.