World Library  
Flag as Inappropriate
Email this Article

Rekeying

Article Id: WHEBN0004138704
Reproduction Date:

Title: Rekeying  
Author: World Heritage Encyclopedia
Language: English
Subject: Locksmithing, Key control, Three-point locking, Time lock, Key retainer
Collection: Cryptographic Protocols, Locksmithing
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Rekeying

Rekeying normally refers to the ability to change a lock so that a different key may operate it. Rekeying is done when a lock owner may be concerned that unauthorized persons have keys to the lock, so the lock may be altered by a locksmith so that only new keys will work. Rekeying is the relatively simple process of changing the tumbler or wafer configuration of the lock so a new key will function while the old one will not. Rekeying is done without replacement of the entire lock.

Rekeying was first invented in 1836 by Solomon Andrews, a New Jersey locksmith. His lock had adjustable tumblers and keys, allowing the owner to rekey it at any time. Later in the 1850s, inventors Andrews and Newell patented removable tumblers which could be taken apart and scrambled. The keys had bits that were interchangeable, matching varying tumbler configurations. This arrangement later became the basis for combination locks.[1]

Contents

  • In Cryptography 1
  • See also 2
  • References 3
  • External links 4

In Cryptography

In cryptography, rekeying refers to the process of changing the session key -- the encryption key of an ongoing communication -- in order to limit the amount of data encrypted with the same key.

Roughly equivalent to the classical procedure of changing codes on a daily basis, the key is changed after a pre-set volume of data has been transmitted or a given period of time has passed.

In contemporary systems, rekeying is implemented by forcing a new key exchange, typically through a separate protocol like Internet key exchange (IKE). The procedure is handled transparently to the user.

A prominent application is Wi-Fi Protected Access (WPA), the extended security protocol for wireless networks that addresses the shortcomings of its predecessor, WEP, by frequently replacing session keys through the Temporal Key Integrity Protocol (TKIP), thus defeating some well-known key recovery attacks.

See also

References

  1. ^ Phillips, Bill (2005). The Complete Book of Locks and Locksmithing. Chicago: McGraw-Hill Professional. p. 9.  

External links

  • OpenSSH: KeyRegenerationInterval parameter, ~R command
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.