Últimas notícias

Fique informado
The ultimate guide to encryption key management

The ultimate guide to encryption key management

31 de outubro de 2020

By Jatin Jain

Introduction

In cryptography, a key is a very important piece of information used to combine with an algorithm (a cipher) to transform plaintext into ciphertext (encryption).

The first step of preventive security is not encryption; however, the proper management of a cryptographic key is essential.

Key management includes the generating, using, storing, archiving and deleting of keys. In modern business, encryption plays a vital role in protecting electronic communications and financial transactions. 

Successful key management is critical to the security of a cryptosystem. It is a more challenging side of cryptography which involves various aspects of social engineering, such as organization, system policy and departmental coordination.

The best thing about encryption is that, if implemented correctly, it is highly resistant to attack. Unfortunately, the weak point of encryption is the keys. If a key is compromised, all your hard work and complexity is all for nothing. This makes cryptography keys the most precious asset of any company. The value of keys is equivalent to the value of your most crucial information or data.

What is encryption key management?

Encryption Key Management is the management of cryptographic keys in the cryptosystem. Key management concerns itself with keys at the user level, either between user or system. Therefore, a robust key management system is important, and policies must include the following:

  • Key life cycle: Key generation, key activation, expiration and destruction
  • Physical access to the key server
  • Logical access to key servers, which should be on a need-to-know basis for businesses
  • Access of user-based roles to encryption keys

We can divide these primarily into three primary key management approaches:

  • Decentralized: In this version, end users are 100% responsible for their own key management and the organization is not required to handle key governance
  • Distributed: Each team or department in the organization handles its own key management protocol, as per their process and policy. They may or may not contact or coordinate between departments
  • Centralized: In this case of centralized key management, there is one policy throughout the entire organization that has to be followed by all. Every team, every department: the user in the organization follows the same key management protocol

Types of encryption keys

There are four basic types of encryption keys: symmetric, asymmetric, public and private.

  • Symmetric encryption: In symmetric-key cryptography, a single encryption key is used for both encryption and decryption of data. This encryption is used to protect data and is a fast algorithm
  • Asymmetric encryption: In asymmetric keys, a pair of keys are used to encrypt and decrypt the data. Both keys are paired with each other and created at the same time. They are referred to as public and private keys
    • Public keys primarily encrypt the data and are only used to encrypt the data, not to decrypt
    • Private keys are used to decrypt the data. This is the only key that can decrypt the encrypted data. Should be password-protected

Encryption key management issues

The proper management of cryptographic keys is essential to the safe use of encryption products. Loss of these keys can lead to loss of an access system and data. Unfortunately, key management is a challenge that increases with the size and complexity of your environment. There are many threats that can result in a key being compromised, and typically, you won’t even know the key has been compromised until it has been exploited by the attacker, which makes the threats all the more dangerous! 

Here are some of the major threats to be considered:

  • Weak keys: The length of the key should be complex for the value of the sensitive data it is securing and the period of time for which it needs to be protected
  • Incorrect use of keys: One key should be generated for a single specific purpose/task only
  • Reuse of keys: Improper reuse of single keys for multiple purposes can be dangerous and may put the organization at high risk
  • Inappropriate storage of keys: This is really important: keys should never be stored at the same place where data is and with the data that they protect, like on a server or database
  • Improper protection of keys: Even keys stored only on server memory can be vulnerable to compromise! Keys should be encrypted whenever stored and only be made available in unencrypted form within a secure tamper-protected environment
  • Insecure movement of keys: It is important to move a key safely between systems. This should be accomplished by encrypting (“wrapping”) the key under a pre-shared transport key, which can be either symmetric or asymmetric keys

Encryption key management best practices:

  • Secure key stores: Key stores must be protected with a complex key in order to achieve optimal security, just like any other sensitive data. They must also be protected wherever they are stored or in transit and especially while in backup. Improper key storage may lead to the loss of all encrypted data
  • Access to key stores: Access to key stores must be limited to the entities that need that particular access. There should also be policies governing key stores, which use separation of roles to help control access. An entity that uses a given key should not be the entity that stores that key
  • Key backup and recoverability: Loss of keys directly means loss of the data that those keys protect. While this is an unintentionally effective way to destroy data, accidental loss of keys protecting mission-critical data would be devastating to a business. Secure backup and recovery solutions must always be implemented

Conclusion

Security is every employee’s business. To maintain the best practices, every individual organization should manage the keys of their own enterprise or any other credible service. Not all sensitive data should be accessible to anyone and everyone, but should be restricted on a need-to-know basis for people who need it to do their work. The monitoring team should investigate access logs from time to time and secure sensitive areas in order to reduce the chances of data being compromised.

Você sabe a diferença? IAM x PAM

Entrevista com William Bergamo sobre como a transformação digital foi acelerada pela pandemia mundial

Jatin Jain

With versatile experience in Information Security domain, he has successfully proven himself in Information Security Audit, Web Application Audit, Vulnerability Assessment, Penetration Testing/ Ethical Hacking and also acted as corporate trainer. Have served different government and private organization and provided best security services. Also he has been awarded from world’s best organization like Face book, Apple, etc for providing best security support to them. He included his name in worldwide recognized various hall of fame as well as written article for famous PenTest, Hackin9 Magazine.

Fonte: INFOSEC INSTITUTE

Crypto ID é o maior canal sobre criptografia no Brasil!

O QUE É CRIPTOGRAFIA?

A criptografia protege a segurança pessoal de bilhões de pessoas e a segurança nacional de países ao redor do mundo.

A criptografia de ponta-a-ponta (end-to-end encryption ou E2EE) é um recurso de segurança que protege os dados durante a troca de mensagens, de forma que o conteúdo só possa ser acessado pelos dois extremos da comunicação: o remetente e o destinatário. 

Criptografia Simétrica

Criptografia Simétrica utiliza uma chave única para cifrar e decifrar a mensagem. Nesse caso o segredo é compartilhado.

Criptografia Assimétrica

Criptografia Assimétrica utiliza um par de chaves: uma chave pública e outra privada que se relacionam por meio de um algoritmo.  O que for criptografado pelo conjunto dessas duas chaves só é decriptografado quando ocorre novamente o match.  

Criptografia Quântica

Criptografia Quântica utiliza algumas características fundamentais da física quântica as quais asseguram o sigilo das informações e soluciona a questão da Distribuição de Chaves Quânticas – Quantum Key Distribution.

Criptografia Homomórfica

Criptografia Homomórfica refere-se a uma classe de métodos de criptografia imaginados por Rivest, Adleman e Dertouzos já em 1978 e construída pela primeira vez por Craig Gentry em 2009. A criptografia homomórfica difere dos métodos de criptografia típicos porque permite a computação para ser executado diretamente em dados criptografados sem exigir acesso a uma chave secreta. O resultado de tal cálculo permanece na forma criptografada e pode, posteriormente, ser revelado pelo proprietário da chave secreta.