What happens if a private key is compromised ?



What happens if a private key is compromised ?..

Answer / ramkumar

Private keys must be stored securely, since forgery and
loss of privacy could result from compromise (see Question
4.1.3.7). The measures taken to protect a private key must
be at least equal to the required security of the messages
encrypted with that key. In general, a private key should
never be stored anywhere in plaintext form. The simplest
storage mechanism is to encrypt a private key under a
password and store the result on a disk. However, passwords
are sometimes very easily guessed; when this scheme is
followed, a password should be chosen very carefully since
the security is tied directly to the password.
Storing the encrypted key on a disk that is not accessible
through a computer network, such as a floppy disk or a
local hard disk, will make some attacks more difficult. It
might be best to store the key in a computer that is not
accessible to other users or on removable media the user
can remove and take with her when she has finished using a
particular computer. Private keys may also be stored on
portable hardware, such as a smart card. Users with
extremely high security needs, such as certifying
authorities, should use tamper-resistant devices to protect
their private keys (see Question 4.1.3.13).

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Encryption Decryption Interview Questions

What is cryptology?

1 Answers  


whats cryptanalysis?

0 Answers  


How to change the location of the Kryptel (Silver Key) program group?

0 Answers  


What is cryptographic synchronisation?

0 Answers  


What is meant by 1024, 2048, 5096 bit encryption?

0 Answers   ASD Lab,






How to I prevent other users from using Kryptel (Silver Key)?

0 Answers   TCS,


Actual role of cryptography is data security .Explain with real world example?

0 Answers  


What is the function of random numbers in encryption and how are they generated?

0 Answers  


What happens if my key is lost ?

1 Answers  


What is key recovery ?

1 Answers  


Blowfish uses the longest key. Does this mean it is the strongest cipher?

0 Answers  


What is the difference between Kryptel and Silver Key?

0 Answers  


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)