About 81,800 results
Open links in new tab
  1. DEK, KEK and Master key - simple explanation

    Mar 2, 2016 · DEK - Data Encryption Key The key used to encrypt the data. e.g. Key: 1234 with AES 128 as encryption algorithem - 1234 is the DEK. KEK - Key Encryption Key. e.g. Encrypt (from DEK above) 1234 with 9999; 9999 is the KEK. Master Key or MEK - Master Encryption Key. This key is used to encrypt/decrypt DEK and KEK in transit; usually used for KEK ...

  2. What is KEK and how is used for key sharing?

    A KEK may be used in combination with ECB mode as the encrypted key material should be indistinguishable from random. This is one of the few places where ECB encryption does not leak information. Note that it is an extremely bad idea to encrypt structured information with ECB; this includes most asymmetric keys as they generally consist of ...

  3. Exchange of DEK and KEK (encryption keys) between app server …

    The key to encrypt the DEK is stored in a totally separate server and is called the Key Encryption Key (KEK). So everytime a data is to be encrypted / decrypted, first the KEK is used to decrypt the en_dek, which gives me the actual DEK, and then this DEK is used to encrypt / decrypt the user's data. Now my question is:

  4. encryption - Why not use the KEK directly to encrypt data ...

    Jan 6, 2023 · A key custodian is a person who holds the keys on behalf of the key owners. They use a KEK to encrypt and decrypt DEKs that belong to the key owners. A key owner then grants access to their DEK to a key user, who is someone authorized by the key owner to use the key to do their day job. This is not quite as simple as keeping the keys locked in ...

  5. Thales HSM: relationship between the various key types?

    Dec 19, 2019 · I am going through the Thales HSM manuals, and frankly the key acronyms are driving me crazy. I would like to understand the differences between the following keys, and how they relate to one another: LMK; TMK/TPK/TAK/TEK; ZMK/ZPK/ZAK/ZEK; DEK; KEK; I know that in terms of "hierarchy" (if that's the right term to use), LMK > TMK/ZMK > TPK/ZPK ...

  6. public key - Can Key-Encryption Key (KEK) be symmetric?

    Oct 16, 2020 · Key wrapping or encapsulation using a KEK can be accomplished using either symmetric or asymmetric cipher For my information KEK solves the key distribution issues with symmetric keys, so only the involved party can decrypt the cypher with their private key, but doesn't using symmetric KEK for distributing symmetric session keys raises the same ...

  7. How does LUKS encrypt the master key? - Cryptography Stack …

    Apr 9, 2021 · the passphrase is turned into a Key Encryption Key (KEK) by a Key Derivative Function (KFD), making it harder to crack via a brute-force attack the KEK is used to encrypt and decrypt the Master Key the encrypted Master Key is stored in plaintext in the LUKS header, and the decrypted Master Key is used to encrypt and decrypt the disk sectors ...

  8. Which KEK can wrap AES, RSA and ECDSA keys securely?

    Jun 9, 2019 · For example, RSA-4096 is usually estimated at somewhat over 128 bits, because it would take a little somewhat more computation effort to brute-force an RSA-4096 key than an AES-128 key. In terms of security, the exact number is irrelevant because it's more than what even the largest nation-state can do even given physically-realistic but ...

  9. encryption - What is the advantage of AES key wrap as opposed …

    Jan 16, 2022 · Context: My KEK is based on a TPM 2.0 (Trusted Platform Module), the device specification does not include AES key wrap and supports a limited block cipher modes of operations (GCM not included). Therefore I'm wondering whether is sufficient wrap the key as follows: Prepare the plain text by appending a 32 byte random nonce to the DEK

  10. Cryptography methods that allow for multiple keys to be used?

    Jul 31, 2022 · You then derive a key called a KEK (Key Encryption Key) from a user's passphrase or other key material. The KEK is used to encrypt the DEK. The encrypted DEK, or eDEK, is stored alongside the encrypted data. To add a new user, you use a valid KEK to decrypt the DEK, then have the new user supply a new KEK which is used to encrypt the DEK again.