Sie sind auf Seite 1von 11

KEY MANAGEMENT

KEY MANAGEMENT
Key management want to make a keys that key must understand to the system that making sure that keys are protected against disclosure or substitution

KEY MANAGEMENT life cycle

CREATION
First step in the key management life cycle is to generate the key
Key creation must be conducted in a secure environment Note in which side security is needed , there is a requirement After generated key generation, it will be a symmetric key Key strength measured in a number of bits

KEY MANAGEMENT

Brute force is considered to be infallible(not able to do fail), although time approach Keyconsuming, management want to make a keys that key must understand to the system that making sure that keys are protected again disclosure or substitution Brute force cracking is a trial (or) error method used by application program to decode encrypted data such as password or DES key through exhaustive error rather than employing intellectual strategies addition to choosing an appropriate key strength

If they need to keep the algorithm secret that it probably means that it cannot withstand(no hackers stand against) scrutiny(close examination)

BACK UP
Where we kept the files likes CD,DVD,USB drive etc..

Deployment
The objective of the deployment phase is to install the new key into the encryption environment While you creating a new key mean, security not charged to remove the old key from environment After creating a new key successfully tested that before leaking the data outage When one should with crypto system, one should tend towards the caution(warning) But that key not able to loss It will have effectively security to access the important data. This is to say with crypto system can become quite costly

Monitoring
1) Unapproved key management operation are not performed, it just check and apply to crypto system . Any sort of unauthorized operation could have seriously considered for your system and for your data
2) Performance of cryptosystem is important Crypto system calculation it takes work in CPU seriously then that man system may be under significant load 3) When data corruption and unavailability happen mean Cryptographic with an overloading encryption service, the results could be fare more serious 4) Monitor that the key has been created and deployed properly corrupted key is Automatically clear that problem without proper wait Suppose if wait will occur mean fault happen in crypto system and Interrupt happen

KEY ROTATION AND EXPIRATION


Key profile should be encrypted with every encrypted data field or file Key profile allows the application to identify the encryption resources that must be Used to decrypt the data field Suppose, if you do unnecessary to decrypt mean and then re-encrypt data automatically key change and expire If the key is original then load the key then that was Used for the encryption . This is a very critical feature for large databases and 24/7 operations and provides for seamless key rotation.

Archival
The agency responsible for selecting, preserving, and making available records determined to have permanent or continuing value. It is a professional who assesses, collects, organizes, preserves, maintains control over, and provides access to information determined to have long term value.

Destruction
The life of a key will end when it is destroyed. Key destruction should follow secure deletion procedures so as to ensure that it is properly obliterated.

Any Queries

Any Queries

S.NAVEEN PSG COLLEGE OF ARTS AND SCIENCE, 12MCM020 PH.NO:-9677668347

Das könnte Ihnen auch gefallen