Next: , Previous: , Up: Contexts   [Contents][Index]


7.5 Key Management

Some of the cryptographic operations require that recipients or signers are specified. This is always done by specifying the respective keys that should be used for the operation. The following section describes how such keys can be selected and manipulated.