Answer Posted / ramkumar
Keys have limited lifetimes for a number of reasons. The
most important reason is protection against cryptanalysis.
Each time the key is used, it generates a number of
ciphertexts. Using a key repetitively allows an attacker to
build up a store of ciphertexts (and possibly plaintexts)
which may prove sufficient for a successful cryptanalysis
of the key value. If you suspect that an attacker may have
obtained your key, the your key is considered compromised .
Research in cryptanalysis can lead to possible attacks
against either the key or the algorithm. For example, RSA
key lengths are increased every few years to ensure that
the improved factoring algorithms do not compromise the
security of messages encrypted with RSA.
Another reason for limiting the lifetime of a key is to
minimize the damage from a compromised key. It is unlikely
that a user will discover that his key has been compromised
by an attacker if the attacker remains "passive."
Relatively frequent key changes will limit any potential
damage from compromised keys. Ford [For94] describes the
life cycle of a key as follows:
key generation and possibly registration for a public key
key distribution
key activation/deactivation
key replacement or key update
key revocation
key termination, involving destruction and possibly
archival
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the counter and pcbc modes?
What is an algorithm?
How can we use quantum properties in cryptography ?
How to I prevent other users from using Kryptel (Silver Key)?
How do certifying authorities store their private keys ?
why hash functions are not used for encryption but authentication ?
What are the ecb and cbc modes?
Actual role of cryptography is data security .Explain with real world example?
What are some other public key cryptosystems ?
What is cryptographic synchronisation?
How is an s-box value of AES can be modified? How is it done?
What is public-key cryptography ?
How to remove the Kryptel (Silver Key) icon from the desktop?
What is public key encryption?
Blowfish uses the longest key. Does this mean it is the strongest cipher?