O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Managing the Encryption Keys

Regardless of the encryption type (symmetrical or asymmetrical), key management is an important issue. It is perhaps the most difficult part of implementing a cryptographic solution. Key management refers to how keys are generated, exchanged, and stored.

Some keys are intended for short-term use only (session keys) and are discarded after a communications session is concluded. Session keys are usually generated automatically and the process is transparent to users.

Other keys are generated by an act of the user and are intended for more long-term use. These keys may be used for authentication or for encrypting data.

The problems involved in key management include

  • How to store keys securely so that unauthorized parties ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required