SECRET AND PUBLIC KEYS

CHAPTER

8

ABOUT THIS CHAPTER

In this chapter we discuss fundamental issues and techniques for handling cryptographic keys. We also introduce the important concept of public-key cryptography. We examine the following topics:

  Managing and using secret keys

  Wrapping techniques for secret keys

  Detecting errors and protecting file integrity

  Public-key cryptography for signing data and wrapping keys

  Public-key certificates

8.1     The Key Management Challenge

When we encrypt a file, we substitute the problem of protecting the file with the problem of protecting its key. Clearly, cryptography gives us no protection if somehow threats can guess or retrieve the keys. Even worse, we might waste our security ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.