ICT2213 Applied Cryptography Lecture 12: Key Management (Key Storage)

IdolizedGoblin avatar
IdolizedGoblin
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the purpose of using a salt in PBKDF2?

To ensure the key is unique for each user

What is the recommended minimum number of iterations for PBKDF2?

1000

How are private keys stored using PKCS #8?

The private key is encrypted using PBES2 with PBKDF2 for key derivation

Which S2K algorithm is recommended for PGP?

Type 3 S2K (iterated and salted)

What is the main claim made by the security company about password-based cryptography?

Password-based keys can be compromised, but the level of security depends on the implementation

What is the primary purpose of using PBKDF2 in password-based cryptography?

To increase the cost of dictionary attacks

Which type of devices are commonly used to store MKs in high-security environments?

Hardware security modules (HSMs)

What is the self-destruct mechanism of Hardware Security Modules (HSMs) triggered by?

Tampering detection

Which technique involves using a key-generating key (KGK) with unique data to derive secret keys stored in secure embedded devices?

Key diversification

Which standard defines key-wrap algorithms for use with an AES KEK to encrypt and store a secret key?

RFC 3394/5649

In the context of secure transactions, what is the purpose of passing KEKs and DKs as parameters to each transaction when needed?

To mitigate key theft risks

What is the main purpose of issuing and storing keys in secure embedded devices like smart cards or tokens?

To ensure tamper-resistant key storage

In a key hierarchy, what is the primary purpose of Master Keys (MKs)?

To distribute and protect Key-Encrypting Keys (KEKs) and Data Keys (DKs)

Which of the following statements about Key-Encrypting Keys (KEKs) is correct?

KEKs are optional and used to distribute and protect Data Keys (DKs)

What is the primary purpose of Data Keys (DKs) in a key hierarchy?

To encrypt and decrypt sensitive data, as well as generate Message Authentication Codes (MACs)

Which of the following statements best describes the rationale behind using a key hierarchy?

To limit the exposure of encryption keys and minimize the amount of protected information

In a key hierarchy, which of the following keys are distributed manually for security reasons?

Master Keys (MKs)

Which of the following statements about key hierarchy is incorrect?

Master Keys (MKs) are used to encrypt and decrypt sensitive data directly

Learn about how key hierarchy is commonly implemented, the difference between master keys, key-encrypting keys, and data keys, and how to implement secure key storage using hardware devices. Also explore insecure key storage methods using password-based key derivation.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser