Ephemeral key

Ephemeral key

A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process. In some cases ephemeral keys are used more than once, within a single session (e.g., in broadcast applications) where the sender generates only one ephemeral key pair per message and the private key is combined separately with each recipient's public key. Contrast with a static key.

ee also

* Cryptographic key types
* "Recommendation for Key Management — Part 1: general," [http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf NIST Special Publication 800-57]
* [http://csrc.nist.gov/CryptoToolkit/ NIST "Cryptographic Toolkit"]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Ephemeral (disambiguation) — Ephemeral geographical features are transitory, existing only briefly.Ephemeral may also refer to:* Ephemeral film, a film made by a particular sponsor for a specific purpose other than as a work of art * Ephemeral key, a cryptographic key… …   Wikipedia

  • Ephemeral Fantasia — Infobox VG title = Ephemeral Fantasia developer = Konami publisher = Konami distributor = designer = engine = version = released = 2001 genre = Role Playing Game modes = Single player ratings = vgratings|ESRB=Teen|ELSPA=11+|OFLCA=M platforms =… …   Wikipedia

  • Cryptographic key types — One of the most important aspects of any cryptographic system is key management; it is also the aspect which is most often neglected.[citation needed] A very common mistake is mixing different key types and reusing the same key for different… …   Wikipedia

  • List of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA) . For classification of keys according to their usage see… …   Wikipedia

  • Glossary of cryptographic key types — This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see… …   Wikipedia

  • Static key — A key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many instances of a cryptographic key establishment scheme. Contrast with an ephemeral key.ee also* Cryptographic key types …   Wikipedia

  • Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge …   Wikipedia

  • Diffie-Hellman key exchange — (D H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications… …   Wikipedia

  • Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… …   Wikipedia

  • United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”