Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?
- revocation and destruction
Explanation: To make a key strong, there are several essential characteristics of key management that should be considered:
- Generation – The use of good random number generators is needed to ensure that all keys are likely to be equally generated so that the attacker cannot predict which keys are more likely to be used.
- Verification – Almost all cryptographic algorithms have some weak keys that should not be used. With the help of key verification procedures, these keys can be regenerated if they occur.
- Exchange – Key management procedures should provide a secure key exchange mechanism that allows secure agreement on the keying material with the other party, probably over an untrusted medium.
- Revocation and Destruction – Revocation notifies all interested parties that a certain key has been compromised and should no longer be used. Destruction erases old keys in a manner that prevents malicious attackers from recovering them.