Many data encryption systems don’t bother with “real” key management – they only store data encryption keys locally, and users never interact with the keys directly.An encryption key management system includes generation, exchange, storage, use, destruction and replacement of encryption keys.Īccording to Securosis’s White Paper, "Pragmatic Key Management for Data Encryption": So, if the data is stolen or accidentally shared, it is protected because it is indecipherable, thanks to data encryption.Ĭontrolling and maintaining data encryption keys is an essential part of any data encryption strategy, because, with the encryption keys, a cybercriminal can return encrypted data to its original unencrypted state. This ciphertext can only be made meaningful again, if the person or application accessing the data has the data encryption keys necessary to decode the ciphertext. Encryption is a process that uses algorithms to encode data as ciphertext.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |