Key management

Cryptoperiod

A cryptoperiod is the time span during which a specific cryptographic key is authorized for use. Common government guidelines range from 1 to 3 years for asymmetric cryptography, and 1 day to 7 days for symmetric cipher traffic keys. Factors to consider include the strength of the underlying encryption algorithm, key length, the likelihood of compromise through a security breach and the availability of mechanisms of revoking keys. In traditional cryptographic practice, keys were changed at regular intervals, typically at the same time each day. The code word for a key change, in NSA parlance, is HJ or Hotel Juliet in the NATO phonetic alphabet. When cryptographic devices began to be used in large scale, those who had to update the key had to set a specific time to synchronize the re-key. This was accomplished at the hour (H) the Julian (J) Date changed, among crypto-accountants, managers and users the jargon "HJ" became the accepted term meaning it was time to change the crypto-key. (Wikipedia).

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Totient Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Totient - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

How To Create Cryptocurrency In C++ | Introduction | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

How To Create Cryptocurrency In C++ | Session 03 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

How To Create Cryptocurrency In C++ | Session 01 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

Basic Principle

A brief description of the "Basic Principle" and how it can be used to test for primality.

From playlist Cryptography and Coding Theory

Related pages

Key (cryptography) | NESTOR (encryption) | Cipher | Secure voice