Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the life cycle of a key ?

Answer Posted / ramkumar

Keys have limited lifetimes for a number of reasons. The
most important reason is protection against cryptanalysis.
Each time the key is used, it generates a number of
ciphertexts. Using a key repetitively allows an attacker to
build up a store of ciphertexts (and possibly plaintexts)
which may prove sufficient for a successful cryptanalysis
of the key value. If you suspect that an attacker may have
obtained your key, the your key is considered compromised .

Research in cryptanalysis can lead to possible attacks
against either the key or the algorithm. For example, RSA
key lengths are increased every few years to ensure that
the improved factoring algorithms do not compromise the
security of messages encrypted with RSA.

Another reason for limiting the lifetime of a key is to
minimize the damage from a compromised key. It is unlikely
that a user will discover that his key has been compromised
by an attacker if the attacker remains "passive."
Relatively frequent key changes will limit any potential
damage from compromised keys. Ford [For94] describes the
life cycle of a key as follows:

key generation and possibly registration for a public key
key distribution
key activation/deactivation
key replacement or key update
key revocation
key termination, involving destruction and possibly
archival

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What information can be obtained from encrypted file?

1919


What is are "proprietary" and "public" cryptographic algorithms?

1903


What is the difference between a message authentication code (MAC) and a one-way hash?

3731


WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?

2314


What is the mceliece cryptosystem?

847


Does encryption of connection strings in web.config file possible? How?

872


What is probabilistic encryption?

850


How to I prevent other users from using Kryptel (Silver Key)?

1856


What Is Encryption?

860


What is secret-key cryptography ?

3952


What is public key encryption?

1864


What are knapsack cryptosystems?

832


How to change the location of the Kryptel (Silver Key) program group?

1926


What is exhaustive key search ?

2016


What is meant by 1024, 2048, 5096 bit encryption?

3572