3 - 4: Key Management Flashcards
Out-of-band key exchange
Exchanging keys (within a symmetric system) in a mutually trusted way
The Diffie-Hellman key exchange
In-band key exchange for symmetric key systems (great visual example @1:42)
1) Start with two numbers, one is prime. 2) Choose a secret number 3) calculate secret number = non-prime number to the secret number mod prime number 4) send the resulting number 5) the other party does the same calculation but with a different secret number 6) calculate the shared number
Key Escrow
Holding keys for law enforcement to use in the event of a crime
Clipper chip
A proposed 1993 solution providing a Law Enforcement Field, allowing the government computer access if necessary, however it was discovered to have flaws
Recovery agents
A master key that can decrypt any encrypted data in an organization
Key stretching
Take a password and use math to make it harder to crack using 1) a salt value and 2) hashing the resulting value
Password-based Key Derivation Function v2
Uses salting and hashing to stretch a key. Should use at least 4,000 times
bCrypt
Key stretching using the blowfish algorithm
Hardware Security Modules
Special hardware designed to manage encryption keys and perform cryptographic operations.
FIPS 140-2
Government guidelines on HSMs.
Sec level 1: Standard operating systems, no physical security
Sec level 2: EAL2 software and firmware, tamper-evident seals
Sec level 3: EAL3 software and firmware, tamper-resistant controls
Sec level 4: EAL4 software and firmware, strict physical security