A STUDY OF KEY MANAGEMENT FOR CONDITIONAL ACCESS SYSTEMS
Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.9, No. 4)Publication Date: 2018-04-30
Authors : Chetan Pandey;
Page : 1781-1789
Keywords : Key Management; Conditional; Access Systems;
Abstract
The research begins off with a breakdown of the basics of CAS and the value of key management. The advantages and disadvantages of various management structures are then discussed. The study also discusses the several types of keys used in CAS, including the content key, control word, and session key. It explains how these keys are generated, propagated, and revoked, and it details the many protocols that are used for these tasks. Before a key's expiration date, it's crucial to revoke it. Others have proposed a concept for automated key revocation based on an estimated key's remaining useful life. By reviewing the existing literature on the topic of key revocation, it was found that the proposed key revocation model performed better than its predecessors. Using the proposed key revocation paradigm, it is possible to successfully revoke cryptographic keys.
Other Latest Articles
- DATA STORAGE SECURITY IN A CLOUD COMPUTING ENVIRONMENT, AN EFFECTIVE AND SECURE PROTOCOL
- FOG COMPUTING ENERGY-AWARE LOAD BALANCING
- Strategies Used in Learner Autonomy Development in English as a Foreign Language Learning among 9th Grade Students
- NATURE INSPIRED ALGORITHMS FOR EFFECTIVE TASK SCHEDULING IN CLOUD COMPUTING
- FEATURE SELECTION MODEL FOR CRIME PREDICTION BASED ON ROUGH-SPANNING TREES
Last modified: 2023-05-04 15:23:49