What happens if a private key is compromised ?



What happens if a private key is compromised ?..

Answer / ramkumar

Private keys must be stored securely, since forgery and
loss of privacy could result from compromise (see Question
4.1.3.7). The measures taken to protect a private key must
be at least equal to the required security of the messages
encrypted with that key. In general, a private key should
never be stored anywhere in plaintext form. The simplest
storage mechanism is to encrypt a private key under a
password and store the result on a disk. However, passwords
are sometimes very easily guessed; when this scheme is
followed, a password should be chosen very carefully since
the security is tied directly to the password.
Storing the encrypted key on a disk that is not accessible
through a computer network, such as a floppy disk or a
local hard disk, will make some attacks more difficult. It
might be best to store the key in a computer that is not
accessible to other users or on removable media the user
can remove and take with her when she has finished using a
particular computer. Private keys may also be stored on
portable hardware, such as a smart card. Users with
extremely high security needs, such as certifying
authorities, should use tamper-resistant devices to protect
their private keys (see Question 4.1.3.13).

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Encryption Decryption Interview Questions

Is there a limit on the file size or on the number of encrypted files?

0 Answers  


What is public-key cryptography ?

0 Answers   TCS,


What is exhaustive key search ?

0 Answers  


What are the disadvantages of public-key cryptography compared with secret-key cryptography?

0 Answers  


What Is Encryption?

0 Answers   TCS,






What happens if a private key is compromised ?

1 Answers  


What is key recovery ?

1 Answers  


What are the advantages and disadvantages of public key cryptography compared with secret key cryptography ?

1 Answers  


what is the difference between encryption and hashing?

1 Answers  


What are knapsack cryptosystems?

0 Answers  


How Encoding is different from Encryption?

0 Answers   HCL,


What happens when a key expires ?

2 Answers   TCS,


Categories
  • Cryptography Algorithms Interview Questions Cryptography Algorithms (52)
  • Digital Certificates Interview Questions Digital Certificates (23)
  • Encryption Decryption Interview Questions Encryption Decryption (77)
  • Ciphers Interview Questions Ciphers (43)
  • Cryptography Protocols Interview Questions Cryptography Protocols (31)
  • Blockchain Interview Questions Blockchain (338)
  • Cryptography General Interview Questions Cryptography General (154)
  • Cryptography AllOther Interview Questions Cryptography AllOther (0)