From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Cryptographic key security

Cryptographic key security

- [Instructor] Cryptographic keys are used to unlock information secured using encryption. Security professionals must be careful to preserve the secrecy and security of these keys in order to maintain the integrity of their uses of encryption. When generating new cryptographic keys, you must be certain to create them in a secure manner. This means creating keys that are randomly generated. The ideal encryption key is a long binary value composed of randomly selected ones and zeros. This eliminates the possibility that an attacker will be able to guess the key by figuring out how you created it because there's no rhyme or reason to its composition. It's random. In addition to using a randomly generated key, you should also use a key that is sufficiently long to avoid brute force attacks. I'll talk about those attacks later in the course, but the general idea is that you're trying to select a key that's so long it's impossible to…

Contents