null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
58670
Crypto U10 (part 1), Key Management & Lifecycle
Descripción
(Unit 10 - Key Mgt Lifecycle) IYM002 Mapa Mental sobre Crypto U10 (part 1), Key Management & Lifecycle, creado por jjanesko el 27/04/2013.
Sin etiquetas
iym002
unit 10 - key mgt lifecycle
iym002
unit 10 - key mgt lifecycle
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
134
10
0
Resumen del Recurso
Crypto U10 (part 1), Key Management & Lifecycle
key lifecycle
key generation
direct key generation
symmetric keys
generate (pseudo)random number
careful: for some algorithms certain values should be avoided
key derivation
derive keys from other keys
derivation function should be one way
prolongs life of base key which is expensive to create
component key generation
different entities provide input to the key
components put into a "combiner"
public key pair generation
requires random number generation
only mathematically appropriate values
must consult relevant standard before generating values for keys
key establishment
getting the key to the right place
Does it need to be.
shared?
distributed in controlled environment?
distributed in uncontrolled environment?
kept secret?
predistributed?
example methods
key hierarchy
key translation
key center has master keys for each entity in network and facilitates key exchange between entitites
key despatch
key center has master keys for each entity in network and generates and dispatches keys for communication between entities
unique key per transaction (UKPT)
a new key is created for each transaction based on value stored in key register and transaction information
Racal UKPT
Derived UKPT Scheme (Visa)
quantum key establishment
key storage
stored encrypted
can be retrieved with correct passphrase
user enters passphrase, passcode turned into key encrypting key, decrypts key
embed in software
store "in the clear"
hide key
store on hardware device
HSM - hardware security module
tamper resistant
micro switches
electronic mesh
resin
temperature detectors
light sensitive diodes
movement or tilt detectors
security chips
keys are generally stored encrypted by local master key (LMK)
standard: FIPS 140
store in component form
backup
keep in case key-in-use is destroyed
archival
keep record after key removed from circulation (legal purposes)
recovery
accessing key on a backup device
can be associated with key escrow
basics
definition: secure administration of cryptographic keys
control types
technical
process
environmental
human factors
requirements
secrecy of key
only the intended audience has access
assurance of purpose
entities must be assured that the key is only used as intended
key management system
system for managing the various phase of the key life cycle
dependent on
network topology
cryptographic mechanisms
legacy issues
compliance restrictions
key properties
length
lifetime (limited)
against key compromise
against key management failures
enforcement of management cycles
against future attacks
flexibility
limitation of key exposure
"cryptoperiod"
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U9, Cryptographic Protocols
jjanesko
Explorar la Librería