Question

Why should you periodically change the key used to encrypt messages? What attack is more likely...

Why should you periodically change the key used to encrypt messages? What attack is more likely to succeed if a key has been used frequently? How frequently should the key be changed?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

We are now dependent more than ever on technology to safeguard our personal, confidential and financial information online. This has left us vulnerable to threats online which could compromise our privacy and sensitive data that is transmitted over the internet such as e-mails, credit card details etc. Encryption is a method of changing this transmitted information in a garbled or unintelligible manner so that it is rendered useless for unauthorized users. However for an authorize user with the key, this message can be decrypted back to its original form. Encryption can be very effective when the key is longer because the amount of effort it takes to break a code which would have a key combination of 2 to the nth power is overwhelming. Using Brute force attack the hacker could try every possible key if it is a lower bit encryption like an 8 bit key (256 combinations) or a 16 bit key (65536 combinations), However breaking a 56 bit (4 quadrillion combinations) or a 128 bit key involves extreme effort and so on. We now have latest SHA-1 (160 bit), SHA-2 (available in 224, 256, 384,616,680 and 512-bit variants). Prudent security practice dictates that you periodically change encryption keys. Rotating or changing the key periodically ensures an additional layer of protection for the data. The reasons to change the key could be varied, below are some of the reasons:

1. The longer the key used, the greater are the chances that it is compromised.

2. It is easier to perform cryptanalysis on a larger volume of cipher text using the same key and also the vulnerability to attack the data is higher.

3. To avoid key tampering with public key cryptography

4. The master key is suspected to be compromised.

5. The person having access to the master key leaves the organization

6. Some periodic updates in the organizations need the keys to be changed or the organization policy requires the change periodically.

Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message. There are several attacks that can be anticipated if the keys are not changed regularly. Some of the major attacks are listed below

1. Brute force attacks: This involves traversing the entire search space for all possible combinations of the password until a match is found. Hence it is recommended to use a strong password with combinations of numbers, special characters and alphabets.

2. Man in the middle attack: This is a type of eavesdropping where an unauthorized party monitors the interactions and communications between two users. The hacker can substitute his own public key to both parties and creates a web of trust thus interpreting all messages between the two parties.

3. Related-key attack: In this type of attack where the analyst has accessinformation on the cipher text using keys which are related to the target key. This is possible even when a part of the key is known.

4. Adaptive and Chosen plain text attack: In these types of attacks the attacker has an arbitrary or a sequence of cipher text and the resulting plain text using which he gathers more information on the keys used.

The rule of thumb is to have a relatively short span for the keys and it should also depend on the criticality of data that is encrypted. If the keys are changed too often the attacker will have a small amount of data to traverse and break into the system. In applications I have worked on the keys have been changed once a year and in some cases once in 6 months. It is beneficial to have a passphrase and a private key for conformation of identities and digital certificates.

Add a comment
Know the answer?
Add Answer to:
Why should you periodically change the key used to encrypt messages? What attack is more likely...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Consider the message '' WHY DONT YOU'' and the key =KEYWORD. Encrypt this message with the...

    Consider the message '' WHY DONT YOU'' and the key =KEYWORD. Encrypt this message with the play fair cipher. The code answer should be " YL EA KT QO KI/J

  • 1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is...

    1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...

  • Describe how an attacker can obtain the one-time pad that is used to encrypt a message,...

    Describe how an attacker can obtain the one-time pad that is used to encrypt a message, given both the message and the ciphertext, and explain why your method works. Suppose that two equal-sized messages M1 and M2 are encrypted with the same one-time pad and let C1 and C2 be the resulting ciphertexts. Suppose further that an attacker captures both ciphertexts C1 and C2, and knows one of the two messages, say M1. Based on Part a), describe how the...

  • What are the main objectives of change control? If you work for a company with a...

    What are the main objectives of change control? If you work for a company with a change control process, describe it. Has the process been successful? If you do not work for a company with change control, what are likely outcomes if a change control process is not used? Why?

  • What are your thoughts on why payback and IRR are more frequently used than NPV, when...

    What are your thoughts on why payback and IRR are more frequently used than NPV, when evaluating projects?

  • Question7 0.1 pts A kinked demand curve O is used to show why oligopolists frequently change...

    Question7 0.1 pts A kinked demand curve O is used to show why oligopolists frequently change prices. explains how certain prices arise in an oligopoly market O shows that firms in oligopolistic markets are not interdependent. O illustrates why oligopolists may be reluctant to change their pricing strategy. O is used to show why oligopolists must collude to set prices. Question 8 0.1 pts Which of the following is true regarding a kinked demand curve? O Firms worry about their...

  • 7. From what you understand about enzymes, explain why a change in an amino acid would...

    7. From what you understand about enzymes, explain why a change in an amino acid would cause Harry's enzyme to lose its function. 8. In both of Henry's mutations, it is the first nucleotide in the DNA triplet code that has been changed. a. Using the genetic code chart below, create a list of single nucleotide changes in the two affected triplet codes described for Henry's genes that could occur WITHOUT resulting in a change in the amino acid in...

  • A student nurse is finishing up a wet-to-dry dressing change. What measure should the student nurse...

    A student nurse is finishing up a wet-to-dry dressing change. What measure should the student nurse take immediately on completion of the dressing change? 1.Document the patient's therapy and progress 2.Charge for supplies used during the dressing change 3.Notify the charge nurse that the dressing has been changed 4.Call and inform the primary health care provider of the condition of the wound

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • What category of budgets are the governance board more likely to be interested in? The two categories of budgets are ope...

    What category of budgets are the governance board more likely to be interested in? The two categories of budgets are operating and financial. The board is more likely to be interested in the financial budgets. a. With a long-term view, which specific two budgets are the most relevant to the governing board and for what reason? (50–80 words) b. A new governance board member is constantly asking the accountant questions about the motor vehicle expenses that are constantly over budget....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT