In cryptography, rekeying refers to the process of changing the session key—the encryption key of an ongoing communication—in order to limit the amount of data encrypted with the same key.

Roughly equivalent to the classical procedure of changing codes on a daily basis, the key is changed after a pre-set volume of data has been transmitted or a given period of time has passed.

In contemporary systems, rekeying is implemented by forcing a new key exchange, typically through a separate protocol like Internet key exchange (IKE). The procedure is handled transparently to the user.

A prominent application is Wi-Fi Protected Access (WPA), the extended security protocol for wireless networks that addresses the shortcomings of its predecessor, WEP, by frequently replacing session keys through the Temporal Key Integrity Protocol (TKIP), thus defeating some well-known key recovery attacks.

In public key infrastructure, rekeying (or "re-keying") leads to issuance of new certificate[1] (in contrast to certificate renewal - issuance of new certificate for the same key, which is usually not allowed by CAs).

See also

References

  1. "Certificate Re-key". Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. IETF. p. 30. sec. 4.4.7. doi:10.17487/RFC3647. RFC 3647.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.