Encryption key management blunders can render deployments useless


This article can also be found in the Premium Editorial Download "Information Security magazine: How to tell if you need the help of security integrators and consultants."

Download it now to read this article plus other related content.

Keys to the Kingdom
Every step of the key management process has an element of risk. You have to balance security and usability, weighing risk against reward as you plan your implementation.

Generation. Keys must be generated in a secure manner so that an administrator generating them does not actually have access to them. Private keys need to be generated in a similar manner to passwords, where no one but the user knows them.

Assignment. The key must be given to the user in a secure manner, guaranteed not to disclose the key. This can be accomplished through the use of third-party software. Typically, the key pair would be generated by the user clicking a link; only the public key is sent to a central repository, and the private key is kept by the user.

Accountability. Everyone understands the importance of protecting Social Security numbers and signatures, but doesn't realize that a key has the same impact. Users must be held accountable for the key and held liable for any damages if it is taken and used.

Exchange. Public keys must be exchanged so people can send and receive encrypted data. A public key does not need to be secure, but you must guarantee that it really belongs to a particular user. The best practice for distributing keys is through the use of certificates. A corporation should have a single key signed by a global CA (certificate authority). They use that key to self-sign subordinate keys,

    Requires Free Membership to View

which, in turn, sign user keys so they can be validated with minimal cost.

Storage and access. Keys must be stored on a drive in some manner that makes it difficult for anyone but the owner of the key to get access to it. Generally, this means the user needs a password or pass phrase to use the key, which is long and complex and never entered directly by the user. Instead, the key is stored in an encrypted virtual safe on the hard drive, and the user only has to remember the combination--the password.

This was first published in June 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: