O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Key management techniques

Cryptographic keys go through a life cycle. From the generation of keys, to their safe destruction, keys have to be managed according to the established policies and procedures.

Key management procedures

Key management consists of four essential procedures concerning public and private keys. They are as follows:

  1. Secure generation of keys: Procedures to ensure that the private and public keys are generated in a secure manner.
  2. Secure storage of keys: Procedures to ensure that keys are stored securely.
  3. Secure distribution of keys: Procedures to ensure that keys are not lost or modified during distribution.
  4. Secure destruction of keys: Procedures to ensure that the keys are destroyed completely once the useful life of the key is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required