Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What happens if my key is lost ?



What happens if my key is lost ?..

Answer / ramkumar

If your private key is lost or destroyed but not
compromised, you can no longer sign or decrypt messages,
but anything previously signed with the lost key is still
valid. The CA (see Question 4.1.3.12) must be notified
immediately so that the key can be revoked and placed on a
certificate revocation list (see Question 4.1.3.16) to
prevent any illegitimate use if the key is found or
recovered by an adversary. Loss of a private key can
happen, for example, if you lose the smart card used to
store your key, or if the disk on which the key is stored
is damaged. You should also obtain a new key right away to
minimize the number of messages people send you that are
encrypted under your old key, since these can no longer be
read.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Encryption Decryption Interview Questions

What is key recovery ?

1 Answers  


How should I store my private key ?

0 Answers   TCS,


What is decryption?

0 Answers   TCS,


What is the mceliece cryptosystem?

0 Answers  


What is cryptology?

1 Answers  


How can we use quantum properties in cryptography ?

0 Answers  


What is multiple encryption?

0 Answers  


whats cryptanalysis?

0 Answers  


What are "stream" and "block" ciphers?

0 Answers  


What is the Popular Symmetric-Key Encryption Method

0 Answers   HCL,


Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.

1 Answers  


what are some of the current encryption schemes?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)