Crypto U10 (part 2), Key Management and Lifecycle

jjanesko
Mind Map by , created over 6 years ago

IYM002 (Unit 10 - Key Mgt Lifecycle) Mind Map on Crypto U10 (part 2), Key Management and Lifecycle, created by jjanesko on 04/27/2013.

76
10
0
jjanesko
Created by jjanesko over 6 years ago
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Stream Cipher
jjanesko
Rights and Responsibilities Flashcards - Edexcel GCSE Religious Studies Unit 8
nicolalennon12
1PR101 2.test - Část 12.
Nikola Truong
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
1 lifecycle (continued)
1.1 key usage
1.1.1 principle of key separation
1.1.1.1 cryptographic keys must only be used for their intended purpose
1.1.1.2 enforcing
1.1.1.2.1 hardware based
1.1.1.2.2 key tagging
1.1.1.2.2.1 add information to key to indicate purpose
1.1.1.2.3 key blocks
1.1.1.2.3.1 format key to also contain data related to the key
1.1.2 key change
1.1.2.1 planned vs. unplanned
1.1.2.2 sometimes it's better to withdraw key
1.1.2.3 can be expensive
1.1.2.4 symmetric keys can be replaced relatively easily
1.1.2.5 public key pairs
1.1.2.5.1 private keys can be replaced relatively easily
1.1.2.5.2 public keys are more challenging because they are distributed to many people potentially
1.1.3 key activation
1.1.3.1 process by which keys are authorized for use at any given time
1.1.3.1.1 ex. I enter a passphrase and that activates a key for use
1.1.4 key destruction
1.1.4.1 when?
1.1.4.1.1 at key expiration
1.1.4.1.2 when key is withdrawn before expiry
1.1.4.1.3 at the end of a period of key archival
1.1.4.2 deleting is not enough
1.1.4.2.1 use data erasure or data sanitisation mechanims
2 governing key managment
2.1 guidance
2.1.1 policy
2.1.1.1 define overall requirements and strategy for key management
2.1.2 practice
2.1.2.1 Define tactics that will be used in order to achieve the key management policy goals.
2.1.3 procedure
2.1.3.1 Document step-by-step tasks necessary to implement the key management practices.

Media attachments