You are on page 1of 1

Prado, Daniel F.

BSIT - 3A

KEY GENERATION - Key generation is managed poorly when the key is weakly
generated. A weak key will make it easier for hackers to hack it.

KEY ESTABLISHMENT - This is a procedure that establish a secret key material that
is shared to different parties or organizations. The key should just be available to
the intended recipient.

KEY STORAGE - These are software-based databases that keep your


public/private keypair locally on your workstation as part of a certificate. Many
programs know to look here automatically instead of you manually looking for
the certificate file each time, so it's a fairly user-friendly alternative.

KEY BACKUP - Key backup is really important because it can be used to be able
to reactivate or to regain access to a file that has lost its key. Without this, there
is a risk of not being able to access the data.

KEY USAGE - Key usage is important because only those who are authorized can
use the key.

KEY ARCHIVAL - Key archival is like key backup wherein an old encrypted key is
being stored in secure storage for future references, archiving and storing keys is
important in this phase because we know that used keys are being deactivated
and converted into new encryption, and with that, if we forgot the new
encrypted key we still have the archived old key to decrypt the data.

KEY DESTRUCTION - Accidentally destruction of an encrypted key is also the


destruction of data especially when key is not backed-up.

KEY CHANGE - It is important in this stage to change the key if you think it can
easily be breached by hackers. Keep in mind that the updated key should not
be too basic for hackers to know and make sure that you will remember the key
that you changed.

You might also like