SECRET AND PUBLIC KEYS |
CHAPTER 8 |
ABOUT THIS CHAPTER
In this chapter we discuss fundamental issues and techniques for handling cryptographic keys. We also introduce the important concept of public-key cryptography. We examine the following topics:
• Managing and using secret keys
• Wrapping techniques for secret keys
• Detecting errors and protecting file integrity
• Public-key cryptography for signing data and wrapping keys
• Public-key certificates
8.1 The Key Management Challenge
When we encrypt a file, we substitute the problem of protecting the file with the problem of protecting its key. Clearly, cryptography gives us no protection if somehow threats can guess or retrieve the keys. Even worse, we might waste our security ...
Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.