呼吸不过来要喘大气是什么情况| 植物神经功能紊乱吃什么药最好| 喝酒后腰疼是什么原因| 南京为什么叫金陵| 吃的少还胖什么原因| 小根蒜学名叫什么| 凌驾是什么意思| 特别容易饿是什么原因| 一月来两次月经是什么原因| 冻顶乌龙茶属于什么茶| 什么是全脂牛奶| 什么解酒| 百日咳是什么意思| 土耳其浴是什么意思| 台风什么时候到上海| 什么食物含钾| 喝什么粥降血糖| 舌自心念什么| 长期口腔溃疡挂什么科| 鳑鲏吃什么| 墨西哥说什么语言| 农历8月是什么星座| 孙策字什么| 白茶属于什么茶类| 宝宝咳嗽流鼻涕吃什么药| 抽烟肺疼是什么原因| 麻疹的症状是什么| 什么分泌胆汁| 小名是什么意思| 什么病不能吃西洋参| 泌尿系统由什么组成| 红骨髓是什么意思| 麻鸡是什么鸡| 莴苣是什么| 分贝是什么意思| 阿奇霉素主治什么病| 辅酶q10的作用是什么| 无语凝噎是什么意思| 弥漫性肝病是什么意思| 什么样的花| 天外有天人外有人是什么意思| 肺癌靶向治疗是什么意思| 失落是什么意思| 开车不能穿什么鞋| 鹰的天敌是什么动物| 梦见打老鼠是什么征兆| 四十年婚姻是什么婚| 什么是癣| 蓝色和红色混合是什么颜色| 代谢慢是什么原因引起的| 水银中毒会出现什么状况| 爱无能是什么意思| 吃什么促进排便| 子宫肌瘤吃什么| 潴留性囊肿是什么意思| 小知了叫什么| 小孩嘴唇发红是什么原因| 错综复杂是什么意思| 关节炎吃什么药好得快| 脚痒用什么药好| 森达属于什么档次的鞋| 医学检验是干什么的| 西米是什么| 膘是什么意思| 无菌性前列腺炎吃什么药效果好| 牙齿痛什么原因| 王力是什么字| 大便感觉拉不干净什么原因| 优质是什么意思| ph值什么意思| 鸡肉煲汤加搭配什么好| 太白金星是什么神| 脾大是怎么回事有什么危害| 说话鼻音重是什么原因| 我们是什么意思| 心跳过缓是什么原因造成的| 什么是华盖| 皈依什么意思| 菌子不能和什么一起吃| 菲律宾货币叫什么| 什么然而生| 长白毛是什么原因| 截胡什么意思| 送男生什么生日礼物好| 纳囊是什么妇科病| 池字五行属什么| 燕然未勒归无计的上一句是什么| 黑色粑粑是什么原因| 土字五行属什么| 不撞南墙不回头是什么意思| 姝字五行属什么| 脱水有什么症状| ny什么牌子| 巴利属于什么档次的| hpv有什么症状吗| 蝉联的意思是什么| 小孩咳嗽吃什么药效果最好| 吃什么生血快| 支原体阳性是什么意思| 月亮是什么颜色| 甲状腺有血流信号是什么意思| 2023年是属什么生肖| 梦见房屋倒塌是什么征兆| 咸鸭蛋为什么会出油| 15岁可以做什么兼职| 尪痹是什么意思| 尿酸高饮食要注意什么| 糖尿病的根源是什么| 肾积水吃什么药| 碘伏和络合碘有什么区别| 卜留克是什么菜| gr是什么单位| 半边脸疼是什么原因引起的| lime是什么水果| 补锌吃什么| 甘油三脂是什么| 右眼皮一直跳是什么原因| 好样的什么意思| 口若悬河是指什么生肖| 地主是什么生肖| 高血糖吃什么药| 目赤肿痛吃什么药最好| bs是什么意思| 时值是什么意思| 肝火郁结是什么症状| 孤单的反义词是什么| 吃什么食物能降低胆固醇| 客家是什么意思| 什么牌子冰箱好| 梦见上楼梯是什么意思| 心度高血压是什么意思| 鱼腥草泡水喝有什么功效| 贾宝玉大名叫什么| 鼻涕倒流吃什么药效果好| 黑今念什么| 少字加一笔是什么字| 什么时候开始暑伏| 回迁房是什么意思| 左右是什么意思| 孕妇建档是什么意思| 脑白质是什么| 史迪奇是什么动物| 什么花花| 鲁迅真名叫什么| 心动过速吃什么药| 狠人是什么意思| 坠积效应是什么意思| 步步高升是什么意思| 皮肤过敏不能吃什么食物| 吃什么补充黄体酮| 做胃镜之前需要做什么准备| 赘肉是什么意思| 为什么乳头会变黑| 身败名裂是什么意思| 藏红花和什么一起泡水喝效果好| 脉濡是什么意思| 16开是什么意思| 与虎谋皮是什么生肖| 右枕前位是什么意思| 3月23日是什么星座| 什么是飞秒手术| 眼袋是什么原因引起的| 流鼻涕咳嗽吃什么药| 上海最高的楼叫什么| 无力感什么意思| 胆囊大是什么原因| 有酒瘾是什么感觉| 风湿类风湿有什么区别| 植物奶油是什么做的| 反洗钱是什么意思| mol是什么意思| 腿部抽筋是什么原因引起的| 湿气太重吃什么药最好| 指南针是什么时候发明的| 鸭肚是鸭的什么部位| 悬雍垂发炎吃什么药| 白球比低是什么原因| 天伦之乐什么意思| 金银花搭配什么泡水喝好| 低血压高吃什么药| oa是什么| 康妇炎胶囊主治什么| 95开头的是什么电话| 海是什么生肖| 失调是什么意思| 2月2号是什么星座| 什么叫五音不全| 电导率低是什么意思| 心季吃什么药| 迥异是什么意思| 喉咙发苦是什么原因造成的| 怀孕三个月吃什么对胎儿好| 空前绝后是什么生肖| 吃什么会食物中毒| cnc是什么牌子| k代表什么意思| 六味地黄丸治什么| 公关是什么意思| 97年的牛是什么命| 梨什么时候成熟| 吃什么可以软化血管| 山楂和什么泡水喝降血压| bpd是胎儿的什么意思| 锑是什么| 咳嗽吃什么好的快偏方| 50年是什么婚姻| 肺部不好有什么症状| 玻璃体混浊用什么眼药水| 高脂血症吃什么药| 大美是什么意思| 火花是什么| 空调抽真空是什么意思| 超声心动图检查什么| 弹性工作制是什么意思| 人这一生为了什么| gc是什么意思| 肛门里面疼是什么原因| 发烧咳嗽吃什么药| 梦见吃水饺是什么预兆| 月嫂下户是什么意思| pq是什么意思| 为什么冰箱冷藏室会结冰| 玉兰片和竹笋有什么区别| 小腿肿胀是什么原因引起的| t1是什么意思| 乌合之众什么意思| 血浆是什么颜色| 为什么我的眼中常含泪水| 手指尖疼是什么原因| 夏至什么意思| 三月十二是什么星座| 银耳和什么一起煮最好| 麻雀为什么跳着走| 感冒发烧吃点什么食物比较好| 长血痣是什么原因| 奇花初胎矞矞皇皇是什么意思| 机智如你是什么意思| 麦冬什么时候种植| 孕妇吃什么水果好对胎儿好| 杺是什么意思| 亥时属什么生肖| ucs是什么意思| 结节是什么| 返流性食管炎用什么药| 测智力去医院挂什么科| 血管痉挛吃什么药| 公貔貅和母貔貅有什么区别| 什么是我的| 宫颈息肉有什么症状| 做乳腺彩超挂什么科| 为什么身体没力气也没有精神| 58是什么意思| 肾阳虚吃什么中成药| 肠胃炎适合吃什么食物| 嗓子咽口水疼吃什么药| 卫生纸是什么垃圾| 甲胎蛋白是检查什么的| c8是什么意思| 月经量突然减少是什么原因| 头昏吃什么药效果最好| 素鲍鱼是什么做的| 李健是清华什么专业| 甲状腺滤泡性肿瘤是什么意思| 乾五行属什么| 百度Jump to content

[重庆]国家三部一局来渝联合开展城市轨道交通安全...

From Wikipedia, the free encyclopedia
百度 《九级浪》从泉州到上海,历尽艰辛,完成“海漂”,最终在上海当代艺术博物馆大厅展出,成为展览重要装置作品。

A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.

Scope

[edit]

The key is what is used to encrypt data from plaintext to ciphertext.[1] There are different methods for utilizing keys and encryption.

Symmetric cryptography

[edit]

Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption.[2]

Asymmetric cryptography

[edit]

Asymmetric cryptography has separate keys for encrypting and decrypting.[3][4] These keys are known as the public and private keys, respectively.[5]

Purpose

[edit]

Since the key protects the confidentiality and integrity of the system, it is important to be kept secret from unauthorized parties. With public key cryptography, only the private key must be kept secret, but with symmetric cryptography, it is important to maintain the confidentiality of the key. Kerckhoff's principle states that the entire security of the cryptographic system relies on the secrecy of the key.[6]

Key sizes

[edit]

Key size is the number of bits in the key defined by the algorithm. This size defines the upper bound of the cryptographic algorithm's security.[7] The larger the key size, the longer it will take before the key is compromised by a brute force attack. Since perfect secrecy is not feasible for key algorithms, researches are now more focused on computational security.

In the past, keys were required to be a minimum of 40 bits in length, however, as technology advanced, these keys were being broken quicker and quicker. As a response, restrictions on symmetric keys were enhanced to be greater in size.

Currently, 2048 bit RSA[8] is commonly used, which is sufficient for current systems. However, current RSA key sizes would all be cracked quickly with a powerful quantum computer.[9]

"The keys used in public key cryptography have some mathematical structure. For example, public keys used in the RSA system are the product of two prime numbers. Thus public key systems require longer key lengths than symmetric systems for an equivalent level of security. 3072 bits is the suggested key length for systems based on factoring and integer discrete logarithms which aim to have security equivalent to a 128 bit symmetric cipher."[10]

Key generation

[edit]

To prevent a key from being guessed, keys need to be generated randomly and contain sufficient entropy. The problem of how to safely generate random keys is difficult and has been addressed in many ways by various cryptographic systems. A key can directly be generated by using the output of a Random Bit Generator (RBG), a system that generates a sequence of unpredictable and unbiased bits.[11] A RBG can be used to directly produce either a symmetric key or the random output for an asymmetric key pair generation. Alternatively, a key can also be indirectly created during a key-agreement transaction, from another key or from a password.[12]

Some operating systems include tools for "collecting" entropy from the timing of unpredictable operations such as disk drive head movements. For the production of small amounts of keying material, ordinary dice provide a good source of high-quality randomness.

Establishment scheme

[edit]

The security of a key is dependent on how a key is exchanged between parties. Establishing a secured communication channel is necessary so that outsiders cannot obtain the key. A key establishment scheme (or key exchange) is used to transfer an encryption key among entities. Key agreement and key transport are the two types of a key exchange scheme that are used to be  remotely exchanged between entities . In a key agreement scheme, a secret key, which is used between the sender and the receiver to encrypt and decrypt information, is set up to be sent indirectly. All parties exchange information (the shared secret) that permits each party to derive the secret key material. In a key transport scheme, encrypted keying material that is chosen by the sender is transported to the receiver. Either symmetric key or asymmetric key techniques can be used in both schemes.[12]

The Diffie–Hellman key exchange and Rivest-Shamir-Adleman (RSA) are the most two widely used key exchange algorithms.[13] In 1976, Whitfield Diffie and Martin Hellman constructed the Diffie–Hellman algorithm, which was the first public key algorithm. The Diffie–Hellman key exchange protocol allows key exchange over an insecure channel by electronically generating a shared key between two parties. On the other hand, RSA is a form of the asymmetric key system which consists of three steps: key generation, encryption, and decryption.[13]

Key confirmation delivers an assurance between the key confirmation recipient and provider that the shared keying materials are correct and established. The National Institute of Standards and Technology recommends key confirmation to be integrated into a key establishment scheme to validate its implementations.[12]

Management

[edit]

Key management concerns the generation, establishment, storage, usage and replacement of cryptographic keys. A key management system (KMS) typically includes three steps of establishing, storing and using keys. The base of security for the generation, storage, distribution, use and destruction of keys depends on successful key management protocols.[14]

Key vs password

[edit]

A password is a memorized series of characters including letters, digits, and other special symbols that are used to verify identity. It is often produced by a human user or a password management software to protect personal and sensitive information or generate cryptographic keys. Passwords are often created to be memorized by users and may contain non-random information such as dictionary words.[12] On the other hand, a key can help strengthen password protection by implementing a cryptographic algorithm which is difficult to guess or replace the password altogether. A key is generated based on random or pseudo-random data and can often be unreadable to humans.[15]

A password is less safe than a cryptographic key due to its low entropy, randomness, and human-readable properties. However, the password may be the only secret data that is accessible to the cryptographic algorithm for information security in some applications such as securing information in storage devices. Thus, a deterministic algorithm called a key derivation function (KDF) uses a password to generate the secure cryptographic keying material to compensate for the password's weakness. Various methods such as adding a salt or key stretching may be used in the generation.[12]

See also

[edit]

References

[edit]
  1. ^ Piper, Fred (2002), "Cryptography", Encyclopedia of Software Engineering, American Cancer Society, doi:10.1002/0471028959.sof070, ISBN 978-0-471-02895-6, retrieved 2025-08-07
  2. ^ "What is a cryptographic key? | Keys and SSL encryption".
  3. ^ "Asymmetric-Key Cryptography". cs.cornell.edu. Retrieved 2025-08-07.
  4. ^ Chandra, S.; Paira, S.; Alam, S. S.; Sanyal, G. (2014). "A comparative survey of Symmetric and Asymmetric Key Cryptography". 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE). pp. 83–93. doi:10.1109/ICECCE.2014.7086640. ISBN 978-1-4799-5748-4. S2CID 377667.
  5. ^ Kumar, M. G. V.; Ragupathy, U. S. (March 2016). "A Survey on current key issues and status in cryptography". 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). pp. 205–210. doi:10.1109/WiSPNET.2016.7566121. ISBN 978-1-4673-9338-6. S2CID 14794991.
  6. ^ Mrdovic, S.; Perunicic, B. (September 2008). "Kerckhoffs' principle for intrusion detection". Networks 2008 - the 13th International Telecommunications Network Strategy and Planning Symposium. Vol. Supplement. pp. 1–8. doi:10.1109/NETWKS.2008.6231360. ISBN 978-963-8111-68-5.
  7. ^ "What is Key Length? - Definition from Techopedia". Techopedia.com. 16 November 2011. Retrieved 2025-08-07.
  8. ^ Hellman, Martin. "An Overview of Public Key Cryptography" (PDF). IEEE Communications Magazine.
  9. ^ "Toward a code-breaking quantum computer". MIT News | Massachusetts Institute of Technology. 2025-08-07. Retrieved 2025-08-07.
  10. ^ "Anatomy of a change – Google announces it will double its SSL key sizes". Naked Security. 2025-08-07. Archived from the original on 8 September 2023. Retrieved 2025-08-07.
  11. ^ Dang, Quynh (August 2012). "Recommendation for Applications Using Approved Hash Algorithms" (PDF). Retrieved 2025-08-07.
  12. ^ a b c d e Turan, M. S.; Barker, E. B.; Burr, W. E.; Chen, L. (2010). Recommendation for password-based key derivation (PDF) (Report). doi:10.6028/NIST.SP.800-132. S2CID 56801929.
  13. ^ a b Yassein, M. B.; Aljawarneh, S.; Qawasmeh, E.; Mardini, W.; Khamayseh, Y. (2017). "Comprehensive study of symmetric key and asymmetric key encryption algorithms". 2017 International Conference on Engineering and Technology (ICET). pp. 1–7. doi:10.1109/ICEngTechnol.2017.8308215. ISBN 978-1-5386-1949-0. S2CID 3781693.
  14. ^ Barker, Elaine (January 2016). "Recommendation for Key Management" (PDF). Retrieved 2025-08-07.
  15. ^ Khillar, Sagar (29 April 2020). "Difference Between Encryption and Password Protection | Difference Between". Retrieved 2025-08-07.
男性一般检查什么 玥字属于五行属什么 为什么会有痛经 m2是什么单位 挺拔的意思是什么
西洋参泡水喝有什么功效 七手八脚是什么意思 ua医学上是什么意思 弱点是什么意思 心衰竭是什么症状
脚后跟疼为什么 pt是什么单位 什么时候闰五月 为什么叫中日友好医院 糖类抗原什么意思
羊肉馅饺子放什么菜 急性扁桃体发炎吃什么药 胃酸的主要成分是什么 科级干部是什么级别 交易是什么意思
茭头是什么hcv8jop3ns4r.cn 为什么男人kuyehao.com 粘胶是什么材质hcv7jop6ns5r.cn brush什么意思hcv8jop9ns1r.cn 小孩流鼻血什么原因hcv8jop0ns6r.cn
气炎念什么hcv8jop4ns9r.cn 黑壳虾吃什么食物hcv9jop2ns6r.cn 猕猴桃不能和什么一起吃hcv8jop0ns5r.cn NF什么意思hcv8jop2ns3r.cn 冠状动脉钙化什么意思0297y7.com
四条杠是什么牌子衣服hcv8jop4ns6r.cn 拔完牙后能吃什么hcv9jop1ns9r.cn 怀孕了吃什么药能流掉hcv8jop9ns6r.cn 芒果什么品种最好吃hcv8jop5ns9r.cn marisfrolg是什么牌子hcv8jop8ns1r.cn
氨基比林是什么药hcv9jop7ns5r.cn 10万个为什么hcv8jop4ns3r.cn 驴胶补血颗粒什么时候喝最好hcv8jop2ns4r.cn 白气是什么物态变化hcv8jop6ns0r.cn 维生素c有什么作用hcv9jop1ns2r.cn
百度