Key Use
The major issue is length of key use, and therefore frequency of replacement. Because it increases any attackers required effort, keys should be frequently changed. This also limits loss of information, as the number of stored encrypted messages which will become readable when a key is found will decrease as the frequency of key change increases. Historically, symmetric keys have been used for long periods in situations in which key exchange was very difficult or only possible intermittently. Ideally, the symmetric key should change with each message or interaction, so that only that message will become readable if the key is learned (e.g., stolen, cryptanalyzed, or social engineered).
Read more about this topic: Key Management
Famous quotes containing the word key:
“At the last, tenderly,
From the walls of the powerful fortressd house,
From the clasp of the knitted locks, from the keep of the well-closed doors,
Let me be wafted.
Let me glide noiselessly forth;
With the key of softness unlock the lockswith a whisper,
Set ope the doors O soul.”
—Walt Whitman (18191892)
“Every revolution was first a thought in one mans mind, and when the same thought occurs in another man, it is the key to that era.”
—Ralph Waldo Emerson (18031882)