Key Agreement and Loose ends Flashcards

1
Q

RSA factoring record

A

2700 core years, which means 2700 PCs to crack in one year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agreeing Secret Key without meeting each other

A

Diffie and Heimman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Diffie and Heimann secure parameters

A
  1. prime p at least 1024 bits
  2. use 1536 or 2048 bit prime p
  3. special number p-1 has a super large prime factor with size almost size of prime p
  4. prime p and prime q related by p-1 = 2q
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Management Considerations(8)

A
  1. Key Generation
  2. Key storage(sloppy?)
  3. Key life cycle(regular?)
  4. Number of people in charge of different keys(bribery)
  5. Destruction/ zeroisation of keys
  6. Key agreement
  7. Key compromise
  8. Key recovery
  • often neglected
  • easier to use keys to read than to decrypt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Management Cheat Sheet (OWASP)

A
  • guides developers in implementing cryptographic key management in app securely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Storage

A
  • never store in plaintext BUT in cryptographic vault like Hardware Security Module (HSM)
  • keys have integrity protections applied in storage
  • all key and cryptographic operation done in sealed vault
How well did you know this?
1
Not at all
2
3
4
5
Perfectly