학술논문

Cryptographic transitions
Document Type
Conference
Source
2006 IEEE Region 5 Conference Region 5 Conference, 2006 IEEE. :22-30 Apr, 2006
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Fields, Waves and Electromagnetics
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Aerospace
Cryptography
Space technology
National security
Data security
Guidelines
NIST
Technology management
Information security
Workstations
Process design
Language
Abstract
A cryptographic transition is defined as managing the passage from one security architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines. This paper addresses the three technology issues that drive the business and security justifications for initiating a transition; the principles guiding policy and practices when conducting a transition; the process to conduct a successful transition; and provides the pros and cons of several actual case studies of cryptographic transitions.