The process of securely storing the cryptographic keys so that unauthorized access is prevented. Techniques may include key escrow, key splitting, and key wrapping.
The process of securely storing the cryptographic keys so that unauthorized access is prevented. Techniques may include key escrow, key splitting, and key wrapping.