All > Technology > Security
The process by which cryptographic keys are securely distributed among cryptographic modules using manual transport methods (e.g., key loaders), automated methods (e.g., key transport and/or key agreement protocols), or a combination of automated and manual methods (consists of key transport plus key agreement).
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization