Comparative Analysis of Cryptographic Key Management Systems

09/21/2021
by   Levgeniia Kuzminykh, et al.
0

Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ key management systems that are able to handle a large number of encryption keys and associate them with the authorized requests. Given their necessity, recent years have witnessed a variety of key management systems, aligned with the features, quality, price and security needs of specific organisations. While the spectrum of such solutions is welcome and demonstrates the expanding nature of the market, it also makes it time consuming for IT managers to identify the appropriate system for their respective company needs. This paper provides a list of key management tools which include a minimum set of features, such as availability of secure database for managing keys, an authentication, authorization, and access control model for restricting and managing access to keys, effective logging of actions with keys, and the presence of an API for accessing functions directly from the application code. Five systems were comprehensively compared by evaluating the attributes related to complexity of the implementation, its popularity, linked vulnerabilities and technical performance in terms of response time and network usage. These were Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican, and Cyberark Conjur. Out of these five, Hachicorp Vault was determined to be the most suitable system for small businesses.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/09/2019

Private key encryption and recovery in blockchain

The disruptive technology of blockchain can deliver secure solutions wit...
research
09/17/2021

From the Beginning: Key Transitions in the First 15 Years of DNSSEC

When the global rollout of the DNS Security Extensions (DNSSEC) began in...
research
12/20/2017

Intel SGX Enabled Key Manager Service with OpenStack Barbican

Protecting data in the cloud continues to gain in importance, with encry...
research
11/11/2019

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Homomorphic encryption (HE) is a promising cryptographic technique for e...
research
07/20/2021

RansomClave: Ransomware Key Management using SGX

Modern ransomware often generate and manage cryptographic keys on the vi...
research
10/16/2019

Consentio: Managing Consent to Data Access using Permissioned Blockchains

The increasing amount of personal data is raising serious issues in the ...
research
07/11/2021

Fairer Software Made Easier (using "Keys")

Can we simplify explanations for software analytics? Maybe. Recent resul...

Please sign up or login with your details

Forgot password? Click here to reset