Keymanagement Life Cycle
Keymanagement Life Cycle
Keymanagement Life Cycle
KEY MANAGEMENT
Key management want to make a keys that key must understand to the system that making sure that keys are protected against disclosure or substitution
CREATION
First step in the key management life cycle is to generate the key
Key creation must be conducted in a secure environment Note in which side security is needed , there is a requirement After generated key generation, it will be a symmetric key Key strength measured in a number of bits
KEY MANAGEMENT
Brute force is considered to be infallible(not able to do fail), although time approach Keyconsuming, management want to make a keys that key must understand to the system that making sure that keys are protected again disclosure or substitution Brute force cracking is a trial (or) error method used by application program to decode encrypted data such as password or DES key through exhaustive error rather than employing intellectual strategies addition to choosing an appropriate key strength
If they need to keep the algorithm secret that it probably means that it cannot withstand(no hackers stand against) scrutiny(close examination)
BACK UP
Where we kept the files likes CD,DVD,USB drive etc..
Deployment
The objective of the deployment phase is to install the new key into the encryption environment While you creating a new key mean, security not charged to remove the old key from environment After creating a new key successfully tested that before leaking the data outage When one should with crypto system, one should tend towards the caution(warning) But that key not able to loss It will have effectively security to access the important data. This is to say with crypto system can become quite costly
Monitoring
1) Unapproved key management operation are not performed, it just check and apply to crypto system . Any sort of unauthorized operation could have seriously considered for your system and for your data
2) Performance of cryptosystem is important Crypto system calculation it takes work in CPU seriously then that man system may be under significant load 3) When data corruption and unavailability happen mean Cryptographic with an overloading encryption service, the results could be fare more serious 4) Monitor that the key has been created and deployed properly corrupted key is Automatically clear that problem without proper wait Suppose if wait will occur mean fault happen in crypto system and Interrupt happen
Archival
The agency responsible for selecting, preserving, and making available records determined to have permanent or continuing value. It is a professional who assesses, collects, organizes, preserves, maintains control over, and provides access to information determined to have long term value.
Destruction
The life of a key will end when it is destroyed. Key destruction should follow secure deletion procedures so as to ensure that it is properly obliterated.
Any Queries
Any Queries