Key creation and rotation for data encryption

作者: Jason Arthur Offrey , Jeffrey Earl MacMillan

DOI:

关键词:

摘要: Embodiments are directed towards enabling cryptographic key rotation without disrupting operations. If is initiated, a transitional may be generated by encrypting the current with built-in system key. A new based one at least determined parameter. Next, activated or more holders. activated, it designated as The employed to encrypt and store in array. Each additional rotated stored array after encrypted Further, response submission of an unencrypted query value, values that correspond number keys generated.

参考文章(12)
Duncan G. Bryce, Kelvin Sjek Yiu, Jianrong Gu, David B. Cross, Monica Ioana Ene-Pietrosanu, Systems and methods for managing multiple keys for file encryption and decryption ,(2010)
William M. Duane, Magnus Nyström, Peter Röstin, Secure seed generation protocol ,(2004)
David Badia, Tim Gray, Vijay Ahuja, Luis Antonio Suarez, Neil Kauer, Automated key management system ,(2006)
Devin Michael Cambridge, Norman Theodore Davis, Brent Dewayne Adkisson, Roger Lynn Musfeldt, Stephen M. Meyers, Brian Kean, Systems and methods for authenticating mobile devices ,(2012)
David Victor Badia, Yuliang Zheng, Neil Kevin Kauer, Cryptographic key backup and escrow system ,(2004)
Jeffrey L. Crandell, Remote storage encryption system ,(2009)