{"draft":"draft-bellovin-mandate-keymgmt-03","doc_id":"RFC4107","title":"Guidelines for Cryptographic Key Management","authors":["S. Bellovin","R. Housley"],"format":["ASCII","HTML"],"page_count":"7","pub_status":"BEST CURRENT PRACTICE","status":"BEST CURRENT PRACTICE","source":"IETF - NON WORKING GROUP","abstract":"The question often arises of whether a given security system requires some form of automated key management, or whether manual keying is\r\nsufficient. This memo provides guidelines for making such decisions. When symmetric cryptographic mechanisms are used in a protocol, the presumption is that automated key management is generally but not always needed. If manual keying is proposed, the burden of proving that automated key management is not required falls to the proposer. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. ","pub_date":"May 2005","keywords":["automated key management","manual key management"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":["BCP0107"],"doi":"10.17487\/RFC4107","errata_url":null}