The following are the major functions associated with managing encryption keys:
- Key generation: Keys must be generated randomly on a secure system. The keys should not be displayed in the clear text.
- Key distribution: securely distributed is a major vulnerability in symmetric key systems. The solution is to use an asymmetric system.
- Key installation: This process should ensure that the key isn’t compromised during installation, or incorrectly entered.
- Key storage: Keys must be stored on protected or encrypted storage media.
- Key change: Keys should regularly be changed, relative to the value of the information being protected and the frequency of use.
- Key control: Different keys have different functions and may only be approved for certain levels of classification. You need to control how they are used.
- Key disposal: There will come a time when we no longer need a specific key. So, this key must be destroyed accurately and completely so that it can never be recovered and ensure that its contents are never disclosed.
The sender encrypts a message with his or her own private key. In destination, the sender’s public key, properly decrypts the message and authenticating the originator of the message.
Cryptography can be used to ensure the integrity of information using a hashing algorithm and message digest algorithm.
Cryptography- Part 1
Cryptography- Part 2
Cryptography- Part 4