Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b) transmitting keys over untrusted communications networks. The constructions are typically built from standard primitives such as block ciphers and cryptographic hash functions.
Key Wrap may be considered as a form of key encapsulation algorithm, although it should not be confused with the more commonly known asymmetric (public-key) key encapsulation algorithms (e.g., PSEC-KEM). Key Wrap algorithms can be used in a similar application: to securely transport a session key by encrypting it under a long-term encryption key.
Read more about Key Wrap: Background
Famous quotes containing the words key and/or wrap:
“Sunshine of late afternoon
On the glass tray
a glass pitcher, the tumbler
turned down, by which
a key is lyingAnd the
immaculate white bed”
—William Carlos Williams (18831963)
“Being a father
Is quite a bother . . .
You improve them mentally
And straighten them dentally, . . .
Theyre no longer corralable
Once they find that youre fallible . . .
But after youve raised them and educated them and
gowned them,
They just take their little fingers and wrap you around
them.
Being a father
Is quite a bother,
But I like it, rather.”
—Ogden Nash (19021971)