202:
84:, rekeying (or "re-keying") leads to issuance of new certificate (in contrast to certificate renewal - issuance of new certificate for the same key, which is usually not allowed by
239:
148:
97:
70:
43:, the key is changed after a pre-set volume of data has been transmitted or a given period of time has passed.
102:
263:
258:
40:
232:
81:
66:
213:
144:
Internet X.509 Public Key
Infrastructure Certificate Policy and Certification Practices Framework
58:
138:
117:
111:
85:
51:
225:
162:
8:
74:
152:
165:
142:
36:
communication—in order to limit the amount of data encrypted with the same key.
209:
29:
252:
47:
17:
62:
25:
183:
157:
46:
In contemporary systems, rekeying is implemented by forcing a new
187:
201:
107:
54:(IKE). The procedure is handled transparently to the user.
65:
that addresses the shortcomings of its predecessor,
69:, by frequently replacing session keys through the
39:Roughly equivalent to the classical procedure of
250:
233:
50:, typically through a separate protocol like
240:
226:
61:(WPA), the extended security protocol for
156:
208:This cryptography-related article is a
73:(TKIP), thus defeating some well-known
251:
24:refers to the process of changing the
196:
151:. p. 30. sec. 4.4.7.
13:
14:
275:
184:KeyRegenerationInterval parameter
176:
200:
71:Temporal Key Integrity Protocol
41:changing codes on a daily basis
131:
1:
124:
103:Elliptic-curve Diffie-Hellman
212:. You can help Knowledge by
7:
98:Diffie–Hellman key exchange
91:
57:A prominent application is
10:
280:
195:
82:public key infrastructure
59:Wi-Fi Protected Access
118:Over the Air Rekeying
112:Internet key exchange
52:Internet key exchange
139:"Certificate Re-key"
75:key recovery attacks
264:Cryptography stubs
259:Encryption devices
221:
220:
63:wireless networks
271:
242:
235:
228:
204:
197:
170:
169:
160:
158:10.17487/RFC3647
135:
279:
278:
274:
273:
272:
270:
269:
268:
249:
248:
247:
246:
193:
179:
174:
173:
137:
136:
132:
127:
94:
12:
11:
5:
277:
267:
266:
261:
245:
244:
237:
230:
222:
219:
218:
205:
191:
190:
178:
177:External links
175:
172:
171:
129:
128:
126:
123:
122:
121:
115:
105:
100:
93:
90:
30:encryption key
9:
6:
4:
3:
2:
276:
265:
262:
260:
257:
256:
254:
243:
238:
236:
231:
229:
224:
223:
217:
215:
211:
206:
203:
199:
198:
194:
189:
185:
181:
180:
167:
164:
159:
154:
150:
146:
145:
140:
134:
130:
119:
116:
113:
109:
106:
104:
101:
99:
96:
95:
89:
87:
83:
78:
76:
72:
68:
64:
60:
55:
53:
49:
44:
42:
37:
35:
31:
27:
23:
19:
214:expanding it
207:
192:
143:
133:
79:
56:
48:key exchange
45:
38:
33:
21:
18:cryptography
15:
26:session key
253:Categories
188:~R command
125:References
182:OpenSSH:
92:See also
22:rekeying
34:ongoing
120:(OTAR)
32:of an
114:(IKE)
108:IPsec
28:—the
210:stub
166:3647
149:IETF
110:and
163:RFC
153:doi
88:).
86:CAs
80:In
67:WEP
16:In
255::
186:,
161:.
147:.
141:.
77:.
20:,
241:e
234:t
227:v
216:.
168:.
155::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.