Key Management Life Cycle

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Key Management Life Cycle:


Certificates and keys have a certain duration. Various factors play into the life span of a particular key. Several things can occur to impact the life span of a key such as being compromised or revoked. There’s also an expiration date for keys. As is the case with a driver’s license or credit card, keys are considered valid for a finite amount of time. Once that time period has expired, the key must be renewed or replaced.

Centralized versus Decentralized Keys: PKI applications use different types of key management. The hierarchical model uses centralized key management. The centralization is based on all of the public keys being stored within one location. Older applications of PGP used decentralized key management, because keys would be contained in a user’s key ring and no one entity is superior over another.

The choice to use either centralized or decentralized key management correlates to the…

View Topics

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel