Key Management Level

Source: Internet
Author: User

 EncryptionAlgorithmThe only purpose of all management principles of the key is to reduce the consequences for the application of the system and the key to the password if one or more secret keys are known by unauthorized persons. Because the password key can be taken home by anyone, it is analyzed in detail. Therefore, they are naturally exposed to the most severe attacks. The methods used include one-host-one-key (export Key), one-class-one-key (Key diversity), one-time-one-key (Session Key), and one-key-multiple-version.

Unique password per machine: the keys of each key are different. When a key is issued, the root key is distributed by the device number and then written to the device. Because the device number is unique in the system, the keys of each device are different and the attack on one key is successful, the loss is limited to a single device and does not constitute a threat to the system.

One-class-one password: to reduce the impact of key leakage, separate keys are often used for different purposes. common key types include: external authentication keys, application maintenance keys, password unlocking keys, password reinstallation keys, encryption and decryption keys, internal authentication keys, and password keys.

One-time password: for many applications, especially in the field of secure data transmission, session keys, also known as temporary keys, are usually used and destroyed immediately after they are used. The real random number generator of the password key makes the generated temporary key irregular, and the attack is basically hopeless.

One-key multi-version: assuming that one type of key for a password is frequently used and plays an important role in the system, it is most likely to become an attack object. If the attack succeeds, the entire application system will be disabled, and the password key publisher will replace all the password keys, resulting in serious harm. When an important key is released, multiple versions of the key are written. If a key of one version is successfully attacked, the application system can immediately enable the key of the next version without any need to replace all the password keys.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.