What happens if a private key is compromised ?



What happens if a private key is compromised ?..

Answer / ramkumar

Private keys must be stored securely, since forgery and
loss of privacy could result from compromise (see Question
4.1.3.7). The measures taken to protect a private key must
be at least equal to the required security of the messages
encrypted with that key. In general, a private key should
never be stored anywhere in plaintext form. The simplest
storage mechanism is to encrypt a private key under a
password and store the result on a disk. However, passwords
are sometimes very easily guessed; when this scheme is
followed, a password should be chosen very carefully since
the security is tied directly to the password.
Storing the encrypted key on a disk that is not accessible
through a computer network, such as a floppy disk or a
local hard disk, will make some attacks more difficult. It
might be best to store the key in a computer that is not
accessible to other users or on removable media the user
can remove and take with her when she has finished using a
particular computer. Private keys may also be stored on
portable hardware, such as a smart card. Users with
extremely high security needs, such as certifying
authorities, should use tamper-resistant devices to protect
their private keys (see Question 4.1.3.13).

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Encryption Decryption Interview Questions

Do encrypted files contain password in some form?

0 Answers  


Blowfish uses the longest key. Does this mean it is the strongest cipher?

0 Answers  


Can the computer which has been used for encryption be traced?

4 Answers   Amazon, NetApp,


What is the life cycle of a key ?

1 Answers  


What happens if a private key is compromised ?

1 Answers  






Actual role of cryptography is data security .Explain with real world example?

0 Answers  


How to I prevent other users from using Kryptel (Silver Key)?

0 Answers   TCS,


How to find someone else?s public key ?

2 Answers  


What is cryptographic synchronisation?

0 Answers  


What is nonlinear cryptography?

0 Answers  


How can we use quantum properties in cryptography ?

0 Answers  


What are the cfb and ofb modes?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)