From the course: CCSP Cert Prep: 2 Data Security
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Cryptographic Key Security
From the course: CCSP Cert Prep: 2 Data Security
Cryptographic Key Security
- [Narrator] Cryptographic keys serve as the literal keys to unlocking information secured using encryption. Security professionals must be careful to preserve the secrecy and the security of these keys in order to maintain the integrity of their uses of encryption. When you're generating new cryptographic keys, you have to be certain to create them in a secure manner. This means creating keys that are randomly generated. The ideal encryption key is a long binary value composed of randomly selected ones and zeros. This eliminates the possibility that an attacker will be able to guess the key by figuring out how you created it because there's no rhyme or reason to its composition. It's random. Now, in addition to using a randomly generated key, you should also use a key that's sufficiently long to avoid brute-force attacks. I'll talk about those attacks later in the course, but the general idea is that you're trying to…