What are the Benefits of SKM?
High Security Storage:
Due to the fact that the private key is not actually stored anywhere as such, even total physical control over the SKM Server will not enable one to retrieve private keys.
Flexible:
SKM currently supports RSA key sizes between 512 and 2048 bit. Future upgrades will support key sizes beyond 2048 bit. The key size can be flexibly chosen upon request. Hence, the SKM can easily support incremental encryption in teams. The port of the Web service can be flexibly adjusted according to your firewall specifications.
Platform-independent:
Keys can be made available in Microsoft’s Crypto Provider or in Java Big Integer format.
Manageable:
Easy-to-use menu-based customizing of SKM Server and Requestor.
Robust:
Emergency recovery procedure.
Auditable:
Tamper-proof encrypted logging in SKM Server and Requestor.
Scalable:
AES 256 bit encryption of SKM Server database content for SAN support.
Secure Communications:
Data exchange between the Requestors and the SKM Server is encrypted and authenticated using 1024 bit RSA keys. Only the requestor originally requesting key generation may retrieve its private key.
Productive:
Hierodiction SKM is more than just a Secure Key Manager. The SKM Requestor ships with a well-documented and powerful cryptographic library, enabling programmers to produce stable and secure cryptographic functions. The functionality includes RSA for encryption and signature, blind signature, zero-knowledge proof, AES, hexadecimal and Big Integer conversion, Random Prime generation and verification, SHA-1, key conversion between Microsoft Crypto Provider and Java Big Integer Mathematics, …
Available interfaces are documented in detail and examples of standard cryptographic scenarios are explained to help your programmers make full use of its powerful functionality.