Crypto U10 (part 2), Key Management and Lifecycle

Description

IYM002 (Unit 10 - Key Mgt Lifecycle) Mind Map on Crypto U10 (part 2), Key Management and Lifecycle, created by jjanesko on 27/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko about 11 years ago
100
10

Resource summary

Crypto U10 (part 2), Key Management and Lifecycle
  1. lifecycle (continued)
    1. key usage
      1. principle of key separation
        1. cryptographic keys must only be used for their intended purpose
          1. enforcing
            1. hardware based
              1. key tagging
                1. add information to key to indicate purpose
                2. key blocks
                  1. format key to also contain data related to the key
              2. key change
                1. planned vs. unplanned
                  1. sometimes it's better to withdraw key
                    1. can be expensive
                      1. symmetric keys can be replaced relatively easily
                        1. public key pairs
                          1. private keys can be replaced relatively easily
                            1. public keys are more challenging because they are distributed to many people potentially
                          2. key activation
                            1. process by which keys are authorized for use at any given time
                              1. ex. I enter a passphrase and that activates a key for use
                            2. key destruction
                              1. when?
                                1. at key expiration
                                  1. when key is withdrawn before expiry
                                    1. at the end of a period of key archival
                                    2. deleting is not enough
                                      1. use data erasure or data sanitisation mechanims
                                2. governing key managment
                                  1. guidance
                                    1. policy
                                      1. define overall requirements and strategy for key management
                                      2. practice
                                        1. Define tactics that will be used in order to achieve the key management policy goals.
                                        2. procedure
                                          1. Document step-by-step tasks necessary to implement the key management practices.
                                      Show full summary Hide full summary

                                      Similar

                                      Crypto U10 (part 1), Key Management & Lifecycle
                                      jjanesko
                                      Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                      jjanesko
                                      Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                      jjanesko
                                      Crypto U3, Theoretical vs. Practical Security
                                      jjanesko
                                      Crypto U1, Basic Principles
                                      jjanesko
                                      Crypto U4, Stream Cipher
                                      jjanesko
                                      Crypto U4, Block Cipher, Counter Mode
                                      jjanesko
                                      Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                      jjanesko
                                      Crypto U2, Crypto design principles
                                      jjanesko
                                      Crypto U9, Cryptographic Protocols
                                      jjanesko
                                      Crypto U8, example dynamic password scheme
                                      jjanesko