Cryptographic Keys 6.1 Flashcards
The Key is the Key
Cryptography isn’t a new science. The algorithm is a known entity. What isn’t know is the key. The key determines the output. Encrypted data, hash value, and digital signature. These are the critical pieces to keep protected.
Key Strength
Larger keys tend to be more secure simply because there is a greater possibility of key combinations. Symmetric keys are commonly 128-bit keys but they will get larger as time goes on. Asymmetric encryption uses complex calculations of prime number. Larger keys than symmetric encryptions, common to see keys lengths of 3,072 bits or larger.
Key Exchange
Transfer out of band (not on the internet). It’s not always practical. We protect a symmetric key by adding additional encryption, usually asymmetric encryption.
Real-Time Encryption/Decryption
There is a need for fast security without compromising the security. You send they symmetric key through asymmetric encryption; private/public key, and then continue to use the symmetric key. It’s best practice to change the session keys at least once or multiple times a day. These are called ephemeral keys.