Key Exchange Flashcards
Security+
What is a logistical challenge in key exchange?
Sharing an encryption key across an insecure medium without physically transferring the key.
What is out-of-band key exchange?
A method of sharing a symmetric key without sending it over the internet, using methods like telephone, courier, or in-person communication.
What is in-band key exchange?
A method of sharing a symmetric key over the network, often protected with additional encryption or using asymmetric encryption to deliver the key.
Why is real-time encryption/decryption important?
There is a need for fast security without compromising the integrity of the security measures.
How does a client share a symmetric session key with a server?
The client encrypts a random symmetric key with the server’s public key, allowing the server to decrypt it and use it for data encryption.
What is a session key?
A temporary symmetric key used to encrypt data during a session, which is shared using asymmetric encryption.
Why should session keys be implemented carefully?
They need to be changed often (ephemeral keys) and should be unpredictable to maintain security.
How is a symmetric key created from asymmetric keys?
By using public and private key cryptography, where mathematical operations are used to derive a symmetric key from asymmetric key pairs.
What is the primary advantage of using asymmetric encryption in key exchange?
It allows secure transmission of a symmetric key over an insecure channel, ensuring confidentiality during the exchange.
What are ephemeral keys?
Temporary keys used for a short duration to enhance security by minimizing the risk of key compromise.