Key Agreement and Loose ends Flashcards
1
Q
RSA factoring record
A
2700 core years, which means 2700 PCs to crack in one year
2
Q
Agreeing Secret Key without meeting each other
A
Diffie and Heimman
3
Q
Diffie and Heimann secure parameters
A
- prime p at least 1024 bits
- use 1536 or 2048 bit prime p
- special number p-1 has a super large prime factor with size almost size of prime p
- prime p and prime q related by p-1 = 2q
4
Q
Key Management Considerations(8)
A
- Key Generation
- Key storage(sloppy?)
- Key life cycle(regular?)
- Number of people in charge of different keys(bribery)
- Destruction/ zeroisation of keys
- Key agreement
- Key compromise
- Key recovery
- often neglected
- easier to use keys to read than to decrypt
5
Q
Key Management Cheat Sheet (OWASP)
A
- guides developers in implementing cryptographic key management in app securely
6
Q
Key Storage
A
- never store in plaintext BUT in cryptographic vault like Hardware Security Module (HSM)
- keys have integrity protections applied in storage
- all key and cryptographic operation done in sealed vault