This chapter considers key management techniques for controlling the distribution, use, and
update of cryptographic keys. Whereas Chapter 12 focuses on details of specific key establishment
protocols which provide shared secret keys, here the focus is on communications
models for key establishment and use, classification and control of keys based on their intended
use, techniques for the distribution of public keys, architectures supporting automated
key updates in distributed systems, and the roles of trusted third parties....