Overview#
Cryptographic Key is a piece of information (a parameter) that determines the functional output of a
cryptographic algorithm or cipher.
Without a Cryptographic Key, the algorithm would produce no useful result. In encryption, a Cryptographic Key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption.
Cryptographic Keys are also used in other cryptographic algorithms, such as digital Signature schemes and Message Authentication Codes.
Just as there are household
keys for the car, front door, garage, etc., Cryptographic Key can serve many different purposes. Understanding these keys necessitates a grasp of their
classification, i.e. the different types of key and their
properties and functions.
At its simplest level, a Cryptographic Key is just a random string consisting of hundreds or thousands of ones and zeroes (i.e. binary digits, or bits). However, keys are always created for a specific function, and the associated key meta-data defines the properties of the key.
Cryptographic Keys may be either static (designed for long term usage) or
ephemeral (designed to be used only for a single session or transaction). The crypto-period (i.e.
lifetime) of static keys may vary from days to weeks, months or even years depending on what they are used for. In general, the greater the crypto-period, the more susceptible it is to
attack and the more
Protected Data is at
risk should it be revealed, so it is important to ensure keys are replaced when required (this process is called updating or cycling).
The length of a key must align with the
algorithm that will use it, although most algorithms support a range of different key sizes. In general, the longer a key is, the better security it provides (assuming it is truly
random).
With Symmetric Keys, the security they provide theoretically increases exponentially with their length (for any given algorithm) – adding one more bit doubles their resistance against Brute-Force attacks. This is not true of Asymmetric Keys, which generally need to be somewhat longer.
Common functions for Cryptographic Keys#
The list below outlines the
National Institute of Standards and Technology (
NIST)
classification of Cryptographic Keys based on their type and usage:
A shorter list of Common functions for Cryptographic Keys
Since Cryptographic Keys are used for protecting
Sensitive Data, there
MUST be proper
Key Management
There might be more information for this subject on one of the following: