Over-the-air rekeying

Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels ("over the air").[1] It is also referred to as over-the-air transfer (OTAT), or over-the-air distribution (OTAD),[2] depending on the specific type, use, and transmission means of the key being changed. Although the acronym refers specifically to radio transmission, the technology is also employed via wire, cable, or optical fiber.

As a "paperless encryption key system" OTAR was originally adopted specifically in support of high speed data communications because previously known "paperless key" systems such as supported by Diffie-Hellman key exchange,[3] or Firefly key exchange technology [4] (as used in the now obsolete STU-III "scrambled" telephone)[5] were not capable of handling the high speed transmission volumes required by normal governmental/military communications traffic.[6] Now also adopted for civilian and commercial secure voice use, especially by emergency first responders, OTAR has become not only a security technology, but a preferred basis of communications security doctrine world-wide. The term "OTAR" is now basic to the lexicon of communications security.

  1. ^ NAG-16C/TSEC.U.S. Navy, Information Systems Technician Training Series
  2. ^ http://www.gps.gov/multimedia/presentations/2015/04/partnership/tyley.pdf [bare URL PDF]
  3. ^ See Diffie–Hellman key exchange
  4. ^ See Firefly (key exchange protocol)
  5. ^ See STU-III
  6. ^ [Creation of OTAR] "echoed some of the objectives of my own development of public key cryptography..." Letter from Whitfield Diffie, Turing Award Winner, to Vice Admiral Sean Buck, Superintendent, United States Naval Academy, Annapolis, MD, August 6th, 2020

Over-the-air rekeying

Dodaje.pl - Ogłoszenia lokalne