
Analysis of Vulnerabilities of Key Management Systems in Distributed Ledger Using the Example of the IBM Blockchain
Author(s) -
Alexander Sergeevich Plotkin,
Sergei A. Kesel,
Maxim Repin,
Nikolay Fedorov
Publication year - 2021
Publication title -
voprosy kiberbezopasnosti
Language(s) - English
Resource type - Journals
ISSN - 2311-3456
DOI - 10.21681/2311-3456-2021-2-61-70
Subject(s) - key management , cryptography , computer science , cryptographic primitive , computer security , cryptographic protocol , ibm , key (lock) , process (computing) , context (archaeology) , operating system , paleontology , materials science , biology , nanotechnology
. Today, one of the most discussed topics in the field of information technology is distributed registry systems. They attract investors and developers with their functionality. Distributed ledger systems are being introduced into business processes in many areas of human activity, which makes their contribution to development irreplaceable. One of the most vulnerable parts of such systems is the process of managing cryptographic keys, an attack on which can destroy the entire security of the distributed registry system. The aim of the research is to identify possible threats to the process of managing cryptographic keys, on the basis of which recommendations and standards for managing cryptographic keys in distributed ledger systems will be developed. Research methods: to achieve this goal, the structure of the life cycle of cryptographic keys was considered, an analysis of possible vulnerabilities in the process of managing cryptographic keys at each stage of the life cycle of a cryptographic key was carried out. In addition, the distributed ledger system was analyzed in the context of the identified vulnerabilities of the key management process using the example of the IBM blockchain and the possibility of outsourcing cryptographic key management systems was considered. Result: a set of possible threats to the process of managing cryptographic keys was proposed, the necessity of assessing the security of the key management system before deciding on the introduction of these systems into distributed registries was proposed, conclusions were drawn about the need to develop recommendations and standards for the process of managing cryptographic keys for such systems, as well as the possibility applicability of the recommendations for assessing the security of the implementation of outsourcing of cryptographic key management systems in distributed ledgers.