KEK meaning in Computing ?

tuteeHUB earn credit +10 pts

Answer: What is Key Encryption Key mean?

This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see cryptographic key types.

40-bit key - key with a length of 40 bits, once the upper limit of what could be exported from the U.S. and other countries without a license. Considered very insecure. See key size for a discussion of this and other lengths.authentication key - Key used in a keyed-hash message authentication code, or HMAC.benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without fear of its being stolen. Also called BLACK key.content-encryption key (CEK) a key that may be further encrypted using a KEK, where the content may be a message, audio, image, video, executable code, etc.crypto ignition key An NSA key storage device (KSD-64) shaped to look like an ordinary physical key.cryptovariable - NSA calls the output of a stream cipher a key or key stream. It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key.data encryption key (DEK) used to encrypt the underlying data.derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase.DRM key - A key used in Digital Rights Management to protect mediaelectronic key - (NSA) key that is distributed in electronic (as opposed to paper) form. See EKMS.ephemeral key - A key that only exists within the lifetime of a communication session.expired key - Key that was issued for a use in a limited time frame (cryptoperiod in NSA parlance) which has passed and, hence, the key is no longer valid.FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.Key derivation function (KDF) - function used to derive a key from a secret value, e.g. to derive KEK from Diffie-Hellman key exchange.key encryption key (KEK) - key used to protect MEK keys (or DEK/TEK if MEK is not used).key production key (KPK) -Key used to initialize a keystream generator for the production of other electronically generated keys.key fill - (NSA) loading keys into a cryptographic device. See fill device.master key - key from which all other keys (or a large group of keys) can be derived. Analogous to a physical key that can open all the doors in a building.master encryption key (MEK) - Used to encrypt the DEK/TEK key.master key encryption key (MKEK) - Used to encrypt multiple KEK keys. For example, an HSM can generate several KEK and wrap them with an MKEK before export to an external DB - such as OpenStack Barbican.one time pad (OTP or OTPad) - keying material that should be as long as the plaintext and should only be used once. If truly random and not reused it's the most secure encryption method. See one-time pad article.one time password (OTP) - One time password based on a prebuilt single use code list or based on a mathematical formula with a secret seed known to both parties, uses event or time to modify output (see TOTP/HOTP).paper key - (NSA) keys that are distributed in paper form, such as printed lists of settings for rotor machines, or keys in punched card or paper tape formats. Paper keys are easily copied. See Walker spy ring, RED key.poem key - Keys used by OSS agents in World War II in the form of a poem that was easy to remember. See Leo Marks.Public/private key - in public key cryptography, separate keys are used to encrypt and decrypt a message. The encryption key (public key) need not be kept secret and can be published. The decryption or private key must be kept secret to maintain confidentiality. Public keys are often distributed in a signed public key certificate.pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill.RED key - (NSA) symmetric key in a format that can be easily copied, e.g. paper key or unencrypted electronic key. Opposite of BLACK or benign key.revoked key - a public key that should no longer be used, typically because its owner is no longer in the role for which it was issued or because it may have been compromised. Such keys are placed on a certificate revocation list or CRL.sessi reference

Report

Posted on 29 Apr 2022, this text provides information on Miscellaneous in Computing related to Computing. Please note that while accuracy is prioritized, the data presented might not be entirely correct or up-to-date. This information is offered for general knowledge and informational purposes only, and should not be considered as a substitute for professional advice.

Take Quiz To Earn Credits!

Turn Your Knowledge into Earnings.

tuteehub_quiz

Write Your Comments or Explanations to Help Others



webstory list tuteehub
Miscellaneous in Computing
webstory list tuteehub
Miscellaneous in Computing


Ever curious about what that abbreviation stands for? fullforms has got them all listed out for you to explore. Simply,Choose a subject/topic and get started on a self-paced learning journey in a world of fullforms.

Important Computing Links

open app imageOPEN APP