Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the life cycle of a key ?



What is the life cycle of a key ?..

Answer / ramkumar

Keys have limited lifetimes for a number of reasons. The
most important reason is protection against cryptanalysis.
Each time the key is used, it generates a number of
ciphertexts. Using a key repetitively allows an attacker to
build up a store of ciphertexts (and possibly plaintexts)
which may prove sufficient for a successful cryptanalysis
of the key value. If you suspect that an attacker may have
obtained your key, the your key is considered compromised .

Research in cryptanalysis can lead to possible attacks
against either the key or the algorithm. For example, RSA
key lengths are increased every few years to ensure that
the improved factoring algorithms do not compromise the
security of messages encrypted with RSA.

Another reason for limiting the lifetime of a key is to
minimize the damage from a compromised key. It is unlikely
that a user will discover that his key has been compromised
by an attacker if the attacker remains "passive."
Relatively frequent key changes will limit any potential
damage from compromised keys. Ford [For94] describes the
life cycle of a key as follows:

key generation and possibly registration for a public key
key distribution
key activation/deactivation
key replacement or key update
key revocation
key termination, involving destruction and possibly
archival

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Encryption Decryption Interview Questions

Actual role of cryptography is data security .Explain with real world example?

0 Answers  


What is public key encryption?

0 Answers  


whats cryptanalysis?

0 Answers  


Do encrypted files contain password in some form?

0 Answers  


What information can be obtained from encrypted file?

0 Answers  


What is cryptology?

1 Answers  


WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?

0 Answers  


Can the computer which has been used for encryption be traced?

4 Answers   Amazon, NetApp,


What key size should be used ?

2 Answers  


How does one find random numbers for keys ?

1 Answers   TCS,


A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

0 Answers  


What is an algorithm?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)