Data Security Tutorial 08 - Solutions
Data Security Tutorial 08 - Solutions
Tutorial 08
Mcq
Essay
1. Explain the process of cryptographic key management.
Cryptographic key management is the process of administering or managing
cryptographic keys for a cryptographic system.
It involves the generation, creation, protection, storage, exchange, replacement,
and use of keys and enables selective restriction for certain keys.
Key management also involves the monitoring and recording of each key’s access,
use, and context.
2. Discuss the reasons to revoke a certificate before it expires
Step 1: Hash (digest) the data using one of the supported Hashing algorithms, e.g.,
MD2, MD5, or SHA-1.
Step 2: Encrypt the hashed data using the sender’s private key.
Step 3: Append the signature (and a copy of the sender’s public key) to the end of
the data that was signed.
4. Explain the concept of Certificate Revocation List (CRL) and its importance in
cryptographic systems.
A CRL is a list maintained by a Certification Authority (CA) that contains revoked
certificates that are still within their validity period. Certificates may be revoked due
to key compromise, loss of trust in the user, or CA compromise. CRLs are essential
in cryptographic systems to ensure that entities do not trust compromised or invalid
certificates, maintaining the security of communications and authentication
processes.