Knowledge

Rekeying (cryptography)

Source đź“ť

202: 84:, rekeying (or "re-keying") leads to issuance of new certificate (in contrast to certificate renewal - issuance of new certificate for the same key, which is usually not allowed by 239: 148: 97: 70: 43:, the key is changed after a pre-set volume of data has been transmitted or a given period of time has passed. 102: 263: 258: 40: 232: 81: 66: 213: 144:
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
58: 138: 117: 111: 85: 51: 225: 162: 8: 74: 152: 165: 142: 36:
communication—in order to limit the amount of data encrypted with the same key.
209: 29: 252: 47: 17: 62: 25: 183: 157: 46:
In contemporary systems, rekeying is implemented by forcing a new
187: 201: 107: 54:(IKE). The procedure is handled transparently to the user. 65:
that addresses the shortcomings of its predecessor,
69:, by frequently replacing session keys through the 39:Roughly equivalent to the classical procedure of 250: 233: 50:, typically through a separate protocol like 240: 226: 61:(WPA), the extended security protocol for 156: 208:This cryptography-related article is a 73:(TKIP), thus defeating some well-known 251: 24:refers to the process of changing the 196: 151:. p. 30. sec. 4.4.7. 13: 14: 275: 184:KeyRegenerationInterval parameter 176: 200: 71:Temporal Key Integrity Protocol 41:changing codes on a daily basis 131: 1: 124: 103:Elliptic-curve Diffie-Hellman 212:. You can help Knowledge by 7: 98:Diffie–Hellman key exchange 91: 57:A prominent application is 10: 280: 195: 82:public key infrastructure 59:Wi-Fi Protected Access 118:Over the Air Rekeying 112:Internet key exchange 52:Internet key exchange 139:"Certificate Re-key" 75:key recovery attacks 264:Cryptography stubs 259:Encryption devices 221: 220: 63:wireless networks 271: 242: 235: 228: 204: 197: 170: 169: 160: 158:10.17487/RFC3647 135: 279: 278: 274: 273: 272: 270: 269: 268: 249: 248: 247: 246: 193: 179: 174: 173: 137: 136: 132: 127: 94: 12: 11: 5: 277: 267: 266: 261: 245: 244: 237: 230: 222: 219: 218: 205: 191: 190: 178: 177:External links 175: 172: 171: 129: 128: 126: 123: 122: 121: 115: 105: 100: 93: 90: 30:encryption key 9: 6: 4: 3: 2: 276: 265: 262: 260: 257: 256: 254: 243: 238: 236: 231: 229: 224: 223: 217: 215: 211: 206: 203: 199: 198: 194: 189: 185: 181: 180: 167: 164: 159: 154: 150: 146: 145: 140: 134: 130: 119: 116: 113: 109: 106: 104: 101: 99: 96: 95: 89: 87: 83: 78: 76: 72: 68: 64: 60: 55: 53: 49: 44: 42: 37: 35: 31: 27: 23: 19: 214:expanding it 207: 192: 143: 133: 79: 56: 48:key exchange 45: 38: 33: 21: 18:cryptography 15: 26:session key 253:Categories 188:~R command 125:References 182:OpenSSH: 92:See also 22:rekeying 34:ongoing 120:(OTAR) 32:of an 114:(IKE) 108:IPsec 28:—the 210:stub 166:3647 149:IETF 110:and 163:RFC 153:doi 88:). 86:CAs 80:In 67:WEP 16:In 255:: 186:, 161:. 147:. 141:. 77:. 20:, 241:e 234:t 227:v 216:. 168:. 155::

Index

cryptography
session key
encryption key
changing codes on a daily basis
key exchange
Internet key exchange
Wi-Fi Protected Access
wireless networks
WEP
Temporal Key Integrity Protocol
key recovery attacks
public key infrastructure
CAs
Diffie–Hellman key exchange
Elliptic-curve Diffie-Hellman
IPsec
Internet key exchange
Over the Air Rekeying
"Certificate Re-key"
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
IETF
doi
10.17487/RFC3647
RFC
3647
KeyRegenerationInterval parameter
~R command
Stub icon
stub
expanding it

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑