Key management techniques

Cryptographic keys go through a life cycle. From the generation of keys, to their safe destruction, keys have to be managed according to the established policies and procedures.

Key management procedures

Key management consists of four essential procedures concerning public and private keys. They are as follows:

  1. Secure generation of keys: Procedures to ensure that the private and public keys are generated in a secure manner.
  2. Secure storage of keys: Procedures to ensure that keys are stored securely.
  3. Secure distribution of keys: Procedures to ensure that keys are not lost or modified during distribution.
  4. Secure destruction of keys: Procedures to ensure that the keys are destroyed completely once the useful life of the key is ...

Get CISSP in 21 Days - Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.